fodhelper.exe
- File Path:
C:\Windows\system32\fodhelper.exe
- Description: Features On Demand Helper
Hashes
Type | Hash |
---|---|
MD5 | 85018BE1FD913656BC9FF541F017EACD |
SHA1 | 26D7407931B713E0F0FA8B872FEECDB3CF49065A |
SHA256 | C546E05D705FFDD5E1E18D40E2E7397F186A7C47FA5FC21F234222D057227CF5 |
SHA384 | DE9AE28B35A9F9ED3D41D222ABCE0C39B8C0E5DBED6FCBC5F6F0001124D28D789C004727044CA12AE09746C5CD19DC37 |
SHA512 | 3E5903CF18386951C015AE23DD68A112B2F4B0968212323218C49F8413B6D508283CC6AAA929DBEAD853BD100ADC18BF497479963DAD42DFAFBEB081C9035459 |
SSDEEP | 768:WwU7bDT2KLt6oPjQQ5fxGIjN44MgZkD9TpiPogpUORaNpohsySZlv7:WtfT2KwoPBxjN4zDbgpUOoo1SZ17 |
IMP | 2BD851C90720C3E5FEE7E3FF3ACFA3D5 |
PESHA1 | 21687605F7285AB4815D1FD6E43A4015B3E2A995 |
PE256 | 3D103B9B4E19548A0B63A8607E28E54F164BE13B2D5FEAF1AC046EBCB90DFEE4 |
Runtime Data
Loaded Modules:
Path |
---|
C:\Windows\System32\ADVAPI32.dll |
C:\Windows\System32\combase.dll |
C:\Windows\system32\fodhelper.exe |
C:\Windows\System32\GDI32.dll |
C:\Windows\System32\gdi32full.dll |
C:\Windows\System32\KERNEL32.DLL |
C:\Windows\System32\KERNELBASE.dll |
C:\Windows\System32\msvcp_win.dll |
C:\Windows\System32\msvcrt.dll |
C:\Windows\SYSTEM32\ntdll.dll |
C:\Windows\System32\OLEAUT32.dll |
C:\Windows\System32\RPCRT4.dll |
C:\Windows\System32\sechost.dll |
C:\Windows\System32\SHELL32.dll |
C:\Windows\System32\ucrtbase.dll |
C:\Windows\System32\USER32.dll |
C:\Windows\System32\win32u.dll |
Signature
- Status: Signature verified.
- Serial:
3300000266BD1580EFA75CD6D3000000000266
- Thumbprint:
A4341B9FD50FB9964283220A36A1EF6F6FAA7840
- Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
File Metadata
- Original Filename: FodHelper.EXE.MUI
- Product Name: Microsoft Windows Operating System
- Company Name: Microsoft Corporation
- File Version: 10.0.19041.1 (WinBuild.160101.0800)
- Product Version: 10.0.19041.1
- Language: English (United States)
- Legal Copyright: Microsoft Corporation. All rights reserved.
- Machine Type: 64-bit
File Scan
- VirusTotal Detections: 0/76
- VirusTotal Link: https://www.virustotal.com/gui/file/c546e05d705ffdd5e1e18d40e2e7397f186a7c47fa5fc21f234222d057227cf5/detection
Possible Misuse
The following table contains possible examples of fodhelper.exe
being misused. While fodhelper.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | proc_creation_win_uac_fodhelper.yml | title: Bypass UAC via Fodhelper.exe |
DRL 1.0 |
sigma | proc_creation_win_uac_fodhelper.yml | description: Identifies use of Fodhelper.exe to bypass User Account Control. Adversaries use this technique to execute privileged processes. |
DRL 1.0 |
sigma | proc_creation_win_uac_fodhelper.yml | ParentImage\|endswith: '\fodhelper.exe' |
DRL 1.0 |
sigma | proc_creation_win_uac_fodhelper.yml | - Legitimate use of fodhelper.exe utility by legitimate user |
DRL 1.0 |
sigma | registry_event_shell_open_keys_manipulation.yml | description: Detects the shell open key manipulation (exefile and ms-settings) used for persistence and the pattern of UAC Bypass using fodhelper.exe, computerdefaults.exe, slui.exe via registry keys (e.g. UACMe 33 or 62) |
DRL 1.0 |
malware-ioc | win_apt_invisimole_uac_bypass.yml | - '\fodhelper.exe' |
© ESET 2014-2018 |
atomic-red-team | index.md | - Atomic Test #3: Bypass UAC using Fodhelper [windows] | MIT License. © 2018 Red Canary |
atomic-red-team | index.md | - Atomic Test #4: Bypass UAC using Fodhelper - PowerShell [windows] | MIT License. © 2018 Red Canary |
atomic-red-team | windows-index.md | - Atomic Test #3: Bypass UAC using Fodhelper [windows] | MIT License. © 2018 Red Canary |
atomic-red-team | windows-index.md | - Atomic Test #4: Bypass UAC using Fodhelper - PowerShell [windows] | MIT License. © 2018 Red Canary |
atomic-red-team | T1548.002.md | - Atomic Test #3 - Bypass UAC using Fodhelper | MIT License. © 2018 Red Canary |
atomic-red-team | T1548.002.md | - Atomic Test #4 - Bypass UAC using Fodhelper - PowerShell | MIT License. © 2018 Red Canary |
atomic-red-team | T1548.002.md | ## Atomic Test #3 - Bypass UAC using Fodhelper | MIT License. © 2018 Red Canary |
atomic-red-team | T1548.002.md | Bypasses User Account Control using the Windows 10 Features on Demand Helper (fodhelper.exe). Requires Windows 10. | MIT License. © 2018 Red Canary |
atomic-red-team | T1548.002.md | fodhelper.exe | MIT License. © 2018 Red Canary |
atomic-red-team | T1548.002.md | ## Atomic Test #4 - Bypass UAC using Fodhelper - PowerShell | MIT License. © 2018 Red Canary |
atomic-red-team | T1548.002.md | PowerShell code to bypass User Account Control using the Windows 10 Features on Demand Helper (fodhelper.exe). Requires Windows 10. | MIT License. © 2018 Red Canary |
atomic-red-team | T1548.002.md | Start-Process “C:\Windows\System32\fodhelper.exe” | MIT License. © 2018 Red Canary |
atomic-red-team | T1548.002.md | Target: \system32\fodhelper.exe | MIT License. © 2018 Red Canary |
MIT License. Copyright (c) 2020-2021 Strontic.