Hangul file vulnerability check solution

Hangul file structure analysis
File vulnerability diagnosis
Providing secure files
Product Overview
HWPScan is a Hangul (HWP) document security diagnostic solution that uses structural analysis technology to check for malware and security vulnerabilities in Hangul (HWP) document files. It analyzes the internal structure and metadata of HWP documents to detect malware and vulnerabilities within them and performs security checks on key areas such as DocInfo. This allows it to proactively identify security threats in Hangul documents and support a secure document distribution environment.

Core Functions

Hangul file structure analysis
  • Check OLE file structure (Storage, Stream)
  • Check and extract Stream hex contents
  • Supports decompression of compressed OLE Streams
  • View images stored within documents
  • View JavaScript within documents
  • View strings within BinData storage substreams
  • Check tag information within documents
Vulnerability diagnosis of Hangul files (5.x, 3.x)
  • Exploit.HWP.Generic.XX (TagID error)
  • Exploit.HWP.Generic.SC (shellcode included)
  • Trojan.PS.Agent (malicious dropper attack using PS)
  • JS.Heuristic (new JavaScript included)
  • Exploit.HWP.Heuristic (shellcode added using compression)
  • Exploit.RTF.Heurisitc (unknown RTF vulnerability added)
  • Exploit.RTF.CVE-2010-3333Exploit.RTF.CVE-2014-1761
Malware detection function
  • VirusTotal.com integrated malware scan
  • Malwares.com integrated malware scan
  • DocInfo integrated malware scan

Supported Environment

Minimum specifications
  • Operating system
  • Windows 7, 8(8.1), 10 (32bit/64bit)
  • CPU
  • Intel Dual Core or higher
  • Memory
  • 4GB or more
  • Hard disk
  • At least 5GB of free space
Recommended specifications
  • Operating system
  • Windows 7, 8(8.1), 10 (32bit/64bit)
  • CPU
  • Intel Core i3 2.9GHz or higher
  • Memory
  • 8GB or more
  • Hard disk
  • At least 10GB of free space

※ Internet connection is required when connecting to 3rd API.

User Interface

hwpscan

Internal stream vulnerability check of entire Hangul document

hwpscan

Exploit.HWP.Generic.43 (Abnormal Paragraph Text)

hwpscan

JS.Heuristic (with hidden JavaScript)

hwpscan

Form with EXE file (found in main Windows API _CreateFile)