sdclt.exe

  • File Path: C:\Windows\system32\sdclt.exe
  • Description: Microsoft Windows Backup

Hashes

Type Hash
MD5 34B64D8A4316A9C97E56C0DFCFCEC3C6
SHA1 893E91C7E9437BFB701E3168B2273EBBFF63A0D6
SHA256 58DD58A15DA129E44CA5116E2DA71A913ABD08C7DE7F3D2F3A843F867108F9A9
SHA384 AED5E20BF06F172C07E72351B908729A75CDE0E625FB03F51E8D36D3A665E2B9D0CAEAB15650FA3666124367AB766D52
SHA512 CE88C272CFDF74496E472B43107A62B24809B2E8168B78B3141EDCB417B8748243175610CEB922EB41F5509249F17797D552F10F6E9C034CCB5D0FB7BA095E44
SSDEEP 24576:sJjr1lDybzUNu/oCexZLIh9yptQHZ7RHegR:o9N2oHZ0aQ5dH9
IMP 1F4349F0C287A904C0483B5CD434DF28
PESHA1 DD19610935D3258507BC19AC4019EAA7B900B434
PE256 ED4DA34405E051AFE8741B8CD83FE2AEC37A58B240DFCBCBE2C241BE36F335BF

Runtime Data

Loaded Modules:

Path
C:\Windows\System32\combase.dll
C:\Windows\System32\GDI32.dll
C:\Windows\System32\gdi32full.dll
C:\Windows\System32\KERNEL32.DLL
C:\Windows\System32\KERNELBASE.dll
C:\Windows\System32\msvcp_win.dll
C:\Windows\System32\msvcrt.dll
C:\Windows\SYSTEM32\ntdll.dll
C:\Windows\System32\OLEAUT32.dll
C:\Windows\system32\ReAgent.dll
C:\Windows\System32\RPCRT4.dll
C:\Windows\system32\sdclt.exe
C:\Windows\system32\SPP.dll
C:\Windows\System32\ucrtbase.dll
C:\Windows\System32\USER32.dll
C:\Windows\System32\win32u.dll

Signature

  • Status: Signature verified.
  • Serial: 3300000266BD1580EFA75CD6D3000000000266
  • Thumbprint: A4341B9FD50FB9964283220A36A1EF6F6FAA7840
  • Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
  • Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

File Metadata

  • Original Filename: sdclt.exe.mui
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 10.0.19041.1 (WinBuild.160101.0800)
  • Product Version: 10.0.19041.1
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.
  • Machine Type: 64-bit

File Scan

  • VirusTotal Detections: 0/75
  • VirusTotal Link: https://www.virustotal.com/gui/file/58dd58a15da129e44ca5116e2da71a913abd08c7de7f3d2f3a843f867108f9a9/detection

File Similarity (ssdeep match)

File Score
C:\Windows\system32\sdclt.exe 50
C:\Windows\system32\sdclt.exe 50
C:\Windows\system32\sdclt.exe 96
C:\Windows\system32\sdclt.exe 47
C:\WINDOWS\system32\sdclt.exe 50

Possible Misuse

The following table contains possible examples of sdclt.exe being misused. While sdclt.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
sigma proc_creation_win_high_integrity_sdclt.yml title: High Integrity Sdclt Process DRL 1.0
sigma proc_creation_win_high_integrity_sdclt.yml description: A General detection for sdclt being spawned as an elevated process. This could be an indicator of sdclt being used for bypass UAC techniques. DRL 1.0
sigma proc_creation_win_high_integrity_sdclt.yml Image\|endswith: 'sdclt.exe' DRL 1.0
sigma proc_creation_win_sdclt_child_process.yml title: Sdclt Child Processes DRL 1.0
sigma proc_creation_win_sdclt_child_process.yml description: A General detection for sdclt spawning new processes. This could be an indicator of sdclt being used for bypass UAC techniques. DRL 1.0
sigma proc_creation_win_sdclt_child_process.yml ParentImage\|endswith: '\sdclt.exe' DRL 1.0
sigma registry_event_bypass_uac_using_delegateexecute.yml - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1548.002/T1548.002.md#atomic-test-7---bypass-uac-using-sdclt-delegateexecute DRL 1.0
sigma registry_event_comhijack_sdclt.yml title: COM Hijack via Sdclt DRL 1.0
sigma registry_event_comhijack_sdclt.yml - http://blog.sevagas.com/?Yet-another-sdclt-UAC-bypass DRL 1.0
sigma registry_event_uac_bypass_sdclt.yml title: UAC Bypass via Sdclt DRL 1.0
sigma registry_event_uac_bypass_sdclt.yml description: Detects the pattern of UAC Bypass using registry key manipulation of sdclt.exe (e.g. UACMe 53) DRL 1.0
sigma registry_event_uac_bypass_sdclt.yml - https://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe/ DRL 1.0
malware-ioc misp_invisimole.json "https://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe/" © ESET 2014-2018
atomic-red-team index.md - Atomic Test #7: Bypass UAC using sdclt DelegateExecute [windows] MIT License. © 2018 Red Canary
atomic-red-team windows-index.md - Atomic Test #7: Bypass UAC using sdclt DelegateExecute [windows] MIT License. © 2018 Red Canary
atomic-red-team T1548.002.md - Atomic Test #7 - Bypass UAC using sdclt DelegateExecute MIT License. © 2018 Red Canary
atomic-red-team T1548.002.md ## Atomic Test #7 - Bypass UAC using sdclt DelegateExecute MIT License. © 2018 Red Canary
atomic-red-team T1548.002.md Upon successful execution, sdclt.exe will spawn cmd.exe to spawn notepad.exe MIT License. © 2018 Red Canary
atomic-red-team T1548.002.md Reference - sevagas.com MIT License. © 2018 Red Canary
atomic-red-team T1548.002.md Start-Process -FilePath $env:windir\system32\sdclt.exe MIT License. © 2018 Red Canary
atomic-red-team T1548.002.md Target: \system32\sdclt.exe MIT License. © 2018 Red Canary

MIT License. Copyright (c) 2020-2021 Strontic.