osk.exe
- File Path:
C:\WINDOWS\system32\osk.exe
- Description: Accessibility On-Screen Keyboard
Screenshot
Hashes
Type | Hash |
---|---|
MD5 | 1B72421A2AD1B293DBF91C94BC886E17 |
SHA1 | 5C5654DB530C2578288B066B4B717EA73A33B3DC |
SHA256 | FD323D368264F51AC8A762C6A164DE8E780BF4CCF28C98F938139FE13530D21D |
SHA384 | 628548B1915624D3F29E4CCAD2041C8E45CB8C8F7128C3C0873F26AD5258999AA20F485349705DC73D52C6F17E8BFA10 |
SHA512 | C260DD8136A346910BC663F16CE93C882252AD4C2EC3EE29D28FD199FEB1361DE3D391041998C95629D2CF3521C22576C76B57B33CB876F7DFFD2FB0B7EC37B3 |
SSDEEP | 6144:e9GRJ0wNLUrGOepuMPtxEOIc1OcvH3AdKy9HGeofJgDEvr6slnCUGw/xIRLtxIRR:9ROkUrGPsjmNwzaoo |
IMP | 7ABC6B524143B385A4A2A788AA31BBE7 |
PESHA1 | D4CA22307CBAF15F4F0C863B35CD726C3DA9360D |
PE256 | D1F68B50A090C1EC2F9EE994E832880B726A47EF81B84DB31A8577A3AE12A632 |
Signature
- Status: Signature verified.
- Serial:
33000002ED2C45E4C145CF48440000000002ED
- Thumbprint:
312860D2047EB81F8F58C29FF19ECDB4C634CF6A
- Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
File Metadata
- Original Filename: osk.exe.mui
- Product Name: Microsoft Windows Operating System
- Company Name: Microsoft Corporation
- File Version: 10.0.22000.1 (WinBuild.160101.0800)
- Product Version: 10.0.22000.1
- Language: English (United States)
- Legal Copyright: Microsoft Corporation. All rights reserved.
- Machine Type: 64-bit
File Scan
- VirusTotal Detections: 0/74
- VirusTotal Link: https://www.virustotal.com/gui/file/fd323d368264f51ac8a762c6a164de8e780bf4ccf28c98f938139fe13530d21d/detection
File Similarity (ssdeep match)
Possible Misuse
The following table contains possible examples of osk.exe
being misused. While osk.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | file_event_win_uac_bypass_wmp.yml | TargetFilename: 'C:\Program Files\Windows Media Player\osk.exe' |
DRL 1.0 |
sigma | proc_creation_win_install_reg_debugger_backdoor.yml | - 'osk.exe' |
DRL 1.0 |
sigma | proc_creation_win_stickykey_like_backdoor.yml | - 'osk.exe' |
DRL 1.0 |
sigma | proc_creation_win_uac_bypass_wmp.yml | Image: 'C:\Program Files\Windows Media Player\osk.exe' |
DRL 1.0 |
sigma | registry_event_stickykey_like_backdoor.yml | - '\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\osk.exe\Debugger' |
DRL 1.0 |
sigma | registry_event_uac_bypass_wmp.yml | TargetObject\|endswith: '\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store\C:\Program Files\Windows Media Player\osk.exe' |
DRL 1.0 |
LOLBAS | Wmic.yml | - Command: wmic.exe process call create "C:\Windows\system32\reg.exe add \"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\osk.exe\" /v \"Debugger\" /t REG_SZ /d \"cmd.exe\" /f" |
|
LOLBAS | Wmic.yml | Description: Add cmd.exe as a debugger for the osk.exe process. Each time osk.exe is run, cmd.exe will be run as well. |
|
atomic-red-team | T1546.008.md | * On-Screen Keyboard: C:\Windows\System32\osk.exe |
MIT License. © 2018 Red Canary |
atomic-red-team | T1546.008.md | Upon successful execution, powershell will modify the registry and swap osk.exe with cmd.exe. | MIT License. © 2018 Red Canary |
atomic-red-team | T1546.008.md | | parent_list | Comma separated list of system binaries to which you want to attach each #{attached_process}. Default: “osk.exe” | String | osk.exe, sethc.exe, utilman.exe, magnify.exe, narrator.exe, DisplaySwitch.exe, atbroker.exe| | MIT License. © 2018 Red Canary |
signature-base | thor_inverse_matches.yar | description = “Abnormal osk.exe (On Screen Keyboard) - typical strings not found in file” | CC BY-NC 4.0 |
signature-base | thor_inverse_matches.yar | filename == “osk.exe” | CC BY-NC 4.0 |
MIT License. Copyright (c) 2020-2021 Strontic.