Skip to main content

HTB-SecretPictures

Table of Contents
Difficulty: Easy
OS: Windows
Date: 2026-02-08

TL;DR
#

A Go-based backdoor that copies itself to C:\Systemlogs\logscheck.exe, establishes persistence via HKCU\...\Run\HealthCheck, enumerates connected drives via GetDriveType, and attempts to connect to malware.invalid.com.

Initial Analysis
#

1secretPictures.exe: PE32+ executable (console) x86-64, 8 sections
2SHA256: 80e82415a26ac7c0124bbaa2133192dadd51cbc5ed22b202ebb24f6fddf8c8ab

Static analysis confirmed the binary was written in Go.

DIE — Golang detection

Sandbox Analysis
#

Seconds after execution the sample copied itself to C:\Systemlogs\ and renamed itself to logscheck.exe.

Self-copy to C:\Systemlogs

Persistence
#

A registry Run key was set to execute logscheck.exe on every user login:

1HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HealthCheck

Registry persistence key

C2 Communication
#

The sample attempted to connect to the hardcoded domain malware.invalid.com.

C2 connection attempt

Drive Enumeration
#

The sample called the GetDriveType WinAPI function to enumerate all connected drives — likely to identify removable media or network shares for lateral movement or data staging.

GetDriveType call in sandbox

IOCs
#

Files
- secretPictures.exe
- SHA256: 80e82415a26ac7c0124bbaa2133192dadd51cbc5ed22b202ebb24f6fddf8c8ab
- C:\Systemlogs\logscheck.exe — persistence copy

Registry
- HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HealthCheck

Network
- C2 Domain: malware.invalid.com