helper.exe
- File Path:
C:\Program Files\Mozilla Firefox\uninstall\helper.exe
- Description: Firefox Helper
Hashes
Type | Hash |
---|---|
MD5 | 4958534E5BCCC61DF92FFE8C75449A3E |
SHA1 | 44B28EFAF47404229DED05A139991F11025A1994 |
SHA256 | 4A634A544816803777F9563B6A7F8C249F533A673D9272DB00C52091C6014349 |
SHA384 | 71E0A27FB732A3C3B1BEADDB86A8EDCDAA342E733DCBAFBD71A2D573BC50CCE0D556B75EAEAD37022636BD8035D0A311 |
SHA512 | A1112981A369990C2EA388C2EC7C9C72B8DCE45BEFDF919D448D7DE0CE1C67122E9874ECC51F7955A9D5BF44B2F6577A91AF1A67EC3BAC383BC09F97977D9E71 |
SSDEEP | 12288:PcUUjD58lP7y8H+RNUDDvmEP77+7qB3DWKtsm453:P5p/eRSu7C3D1tT453 |
Signature
- Status: Signature verified.
- Serial:
0DDEB53F957337FBEAF98C4A615B149D
- Thumbprint:
91CABEA509662626E34326687348CAF2DD3B4BBA
- Issuer: CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US
- Subject: E=”release+certificates@mozilla.com”, CN=Mozilla Corporation, OU=Firefox Engineering Operations, O=Mozilla Corporation, L=Mountain View, S=California, C=US
File Metadata
- Original Filename: helper.exe
- Product Name: Firefox
- Company Name: Mozilla Corporation
- File Version: 79.0
- Product Version: 79.0
- Language: English (United States)
- Legal Copyright: Mozilla Corporation
File Similarity (ssdeep match)
Possible Misuse
The following table contains possible examples of helper.exe
being misused. While helper.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | posh_ps_winlogon_helper_dll.yml | title: Winlogon Helper DLL |
DRL 1.0 |
sigma | posh_ps_winlogon_helper_dll.yml | description: Winlogon.exe is a Windows component responsible for actions at logon/logoff as well as the secure attention sequence (SAS) triggered by Ctrl-Alt-Delete. Registry entries in HKLM\Software[Wow6432Node]Microsoft\Windows NT\CurrentVersion\Winlogon\ and HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ are used to manage additional helper programs and functionalities that support Winlogon. Malicious modifications to these Registry keys may cause Winlogon to load and execute malicious DLLs and/or executables. |
DRL 1.0 |
sigma | proc_creation_win_susp_netsh_dll_persistence.yml | description: Detects persitence via netsh helper |
DRL 1.0 |
sigma | proc_creation_win_susp_netsh_dll_persistence.yml | - 'helper' |
DRL 1.0 |
sigma | proc_creation_win_susp_pcwutl.yml | - Use of Program Compatibility Troubleshooter Helper |
DRL 1.0 |
sigma | registry_event_asep_reg_keys_modification.yml | - '\Explorer\Browser Helper Objects' |
DRL 1.0 |
sigma | registry_event_asep_reg_keys_modification_currentversion.yml | - '\Explorer\Browser Helper Objects' |
DRL 1.0 |
sigma | registry_event_asep_reg_keys_modification_wow6432node.yml | - '\Explorer\Browser Helper Objects' |
DRL 1.0 |
sigma | registry_event_asep_reg_keys_modification_wow6432node.yml | TargetObject\|contains: '\Explorer\Browser Helper Objects\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\' |
DRL 1.0 |
sigma | registry_event_asep_reg_keys_modification_wow6432node.yml | TargetObject\|endswith: '\Explorer\Browser Helper Objects\{92EF2EAD-A7CE-4424-B0DB-499CF856608E}\NoExplorer' |
DRL 1.0 |
LOLBAS | Netsh.yml | - Command: netsh.exe add helper C:\Path\file.dll |
|
LOLBAS | Netsh.yml | Description: Load (execute) NetSh.exe helper DLL file. |
|
LOLBAS | Atbroker.yml | Description: Helper binary for Assistive Technology (AT) |
|
LOLBAS | Netsh.yml | - Command: netsh.exe add helper C:\Users\User\file.dll |
|
malware-ioc | misp_invisimole.json | "comment": "RC2FM helper DLL", |
© ESET 2014-2018 |
malware-ioc | invisimole | ==== RC2FM helper DLL |
© ESET 2014-2018 |
malware-ioc | win_apt_invisimole_helper_dll.yml | title: InvisiMole Helper DLLs dropped |
© ESET 2014-2018 |
atomic-red-team | index.md | - T1546.007 Netsh Helper DLL | MIT License. © 2018 Red Canary |
atomic-red-team | index.md | - Atomic Test #1: Netsh Helper DLL Registration [windows] | MIT License. © 2018 Red Canary |
atomic-red-team | index.md | - T1547.004 Winlogon Helper DLL | MIT License. © 2018 Red Canary |
atomic-red-team | windows-index.md | - T1546.007 Netsh Helper DLL | MIT License. © 2018 Red Canary |
atomic-red-team | windows-index.md | - Atomic Test #1: Netsh Helper DLL Registration [windows] | MIT License. © 2018 Red Canary |
atomic-red-team | windows-index.md | - T1547.004 Winlogon Helper DLL | MIT License. © 2018 Red Canary |
atomic-red-team | matrix.md | | | | Local Account | Netsh Helper DLL | File Deletion | Unsecured Credentials CONTRIBUTE A TEST | | | | | | | | MIT License. © 2018 Red Canary |
atomic-red-team | matrix.md | | | | Netsh Helper DLL | Path Interception by Search Order Hijacking CONTRIBUTE A TEST | Hidden Files and Directories | | | | | | | | | MIT License. © 2018 Red Canary |
atomic-red-team | matrix.md | | | | Systemd Service | Winlogon Helper DLL | Pass the Ticket | | | | | | | | | MIT License. © 2018 Red Canary |
atomic-red-team | matrix.md | | | | Winlogon Helper DLL | | Process Hollowing | | | | | | | | | MIT License. © 2018 Red Canary |
atomic-red-team | windows-matrix.md | | | | Logon Script (Windows) | Netsh Helper DLL | File and Directory Permissions Modification CONTRIBUTE A TEST | Silver Ticket CONTRIBUTE A TEST | | | | | Traffic Signaling CONTRIBUTE A TEST | | | MIT License. © 2018 Red Canary |
atomic-red-team | windows-matrix.md | | | | Netsh Helper DLL | Parent PID Spoofing | Hidden File System CONTRIBUTE A TEST | Steal or Forge Kerberos Tickets CONTRIBUTE A TEST | | | | | Web Service CONTRIBUTE A TEST | | | MIT License. © 2018 Red Canary |
atomic-red-team | windows-matrix.md | | | | Shortcut Modification | Winlogon Helper DLL | Odbcconf | | | | | | | | | MIT License. © 2018 Red Canary |
atomic-red-team | windows-matrix.md | | | | Winlogon Helper DLL | | Portable Executable Injection CONTRIBUTE A TEST | | | | | | | | | MIT License. © 2018 Red Canary |
atomic-red-team | T1219.md | Invoke-WebRequest -OutFile C:\Users$env:username\Downloads\GoToAssist.exe “https://launch.getgo.com/launcher2/helper?token=e0-FaCddxmtMoX8cY4czssnTeGvy83ihp8CLREfvwQshiBW0_RcbdoaEp8IA-Qn8wpbKlpGIflS-39gW6RuWRM-XHwtkRVMLBsp5RSKp-a3PBM-Pb1Fliy73EDgoaxr-q83WtXbLKqD7-u3cfDl9gKsymmhdkTGsXcDXir90NqKj92LsN_KpyYwV06lIxsdRekhNZjNwhkWrBa_hG8RQJqWSGk6tkZLVMuMufmn37eC2Cqqiwq5bCGnH5dYiSUUsklSedRLjh4N46qPYT1bAU0qD25ZPr-Kvf4Kzu9bT02q3Yntj02ZA99TxL2-SKzgryizoopBPg4Ilfo5t78UxKTYeEwo4etQECfkCRvenkTRlIHmowdbd88zz7NiccXnbHJZehgs6-JSVjQIdPTXZbF9T5z44mi4BQYMtZAS3DE86F0C3D4Tcd7fa5F6Ve8rQWt7pvqFCYyiJAailslxOw0LsGyFokoy65tMF980ReP8zhVcTKYP8s8mhGXihUQJQPNk20Sw&downloadTrigger=restart&renameFile=1” | MIT License. © 2018 Red Canary |
atomic-red-team | T1546.007.md | # T1546.007 - Netsh Helper DLL | MIT License. © 2018 Red Canary |
atomic-red-team | T1546.007.md | <blockquote>Adversaries may establish persistence by executing malicious content triggered by Netsh Helper DLLs. Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system. It contains functionality to add helper DLLs for extending functionality of the utility. (Citation: TechNet Netsh) The paths to registered netsh.exe helper DLLs are entered into the Windows Registry at HKLM\SOFTWARE\Microsoft\Netsh . |
MIT License. © 2018 Red Canary |
atomic-red-team | T1546.007.md | Adversaries can use netsh.exe helper DLLs to trigger execution of arbitrary code in a persistent manner. This execution would take place anytime netsh.exe is executed, which could happen automatically, with another persistence technique, or if other software (ex: VPN) is present on the system that executes netsh.exe as part of its normal functionality. (Citation: Github Netsh Helper CS Beacon)(Citation: Demaske Netsh Persistence)</blockquote> | MIT License. © 2018 Red Canary |
atomic-red-team | T1546.007.md | - Atomic Test #1 - Netsh Helper DLL Registration | MIT License. © 2018 Red Canary |
atomic-red-team | T1546.007.md | ## Atomic Test #1 - Netsh Helper DLL Registration | MIT License. © 2018 Red Canary |
atomic-red-team | T1546.007.md | netsh.exe add helper #{helper_file} | MIT License. © 2018 Red Canary |
atomic-red-team | T1547.004.md | # T1547.004 - Winlogon Helper DLL | MIT License. © 2018 Red Canary |
atomic-red-team | T1547.004.md | <blockquote>Adversaries may abuse features of Winlogon to execute DLLs and/or executables when a user logs in. Winlogon.exe is a Windows component responsible for actions at logon/logoff as well as the secure attention sequence (SAS) triggered by Ctrl-Alt-Delete. Registry entries in HKLM\Software[\\Wow6432Node\\]\Microsoft\Windows NT\CurrentVersion\Winlogon\ and HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ are used to manage additional helper programs and functionalities that support Winlogon. (Citation: Cylance Reg Persistence Sept 2013) |
MIT License. © 2018 Red Canary |
atomic-red-team | T1548.002.md | Bypasses User Account Control using the Windows 10 Features on Demand Helper (fodhelper.exe). Requires Windows 10. | MIT License. © 2018 Red Canary |
atomic-red-team | T1548.002.md | PowerShell code to bypass User Account Control using the Windows 10 Features on Demand Helper (fodhelper.exe). Requires Windows 10. | MIT License. © 2018 Red Canary |
signature-base | apt_sofacy_dec15.yar | description = “Dropped C&C helper DLL for AZZY 4.3” | CC BY-NC 4.0 |
signature-base | crime_crypto_miner.yar | description = “Detects helper script used in a crypto miner campaign” | CC BY-NC 4.0 |
signature-base | gen_anomalies_keyword_combos.yar | $fp5 = “Firefox Helper” wide fullword | CC BY-NC 4.0 |
signature-base | yara_mixed_ext_vars.yar | $s2 = “AcroTray - Adobe Acrobat Distiller helper application” fullword wide | CC BY-NC 4.0 |
signature-base | yara_mixed_ext_vars.yar | $s2 = “Virtual hardware upgrade helper service” fullword wide | CC BY-NC 4.0 |
MIT License. Copyright (c) 2020-2021 Strontic.