sethc.exe
- File Path:
C:\WINDOWS\system32\sethc.exe
- Description: Accessibility shortcut keys
Hashes
Type | Hash |
---|---|
MD5 | 0899A093B921E175DCF7EA5EBCC65306 |
SHA1 | B4FFBF9B6404FB089C9C9781F773ECD02FD0B7BC |
SHA256 | DF4CC0EB831CC48D45F21B280C1D78800B5AE107A65070C63DE506D3AB5ADEC5 |
SHA384 | 4F7AC01306342B72BAA5AA15CDEB211709190179B8AD5DEF1639250B09DA5A9F899FAFC0178965C9D54CDA8EB16D3644 |
SHA512 | F94AED4ABA2EE2E89FCAB05D99FA5D37B9173A0BFD45DE3B35C6497DCC02E48C5270BE5C1B53596206AF7CA789DAAE4E2B9C380E47BA97154ED74AA369DBC8FF |
SSDEEP | 1536:It+nB7SR0oZGHcb9q+HIt+wwtnK7sOK/qRLb48sm9+W/6H5lNdzDv:vB7SRUHwq+HNwEOK/q2dLH5lX7 |
Signature
- Status: Signature verified.
- Serial:
330000023241FB59996DCC4DFF000000000232
- Thumbprint:
FF82BC38E1DA5E596DF374C53E3617F7EDA36B06
- Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
File Metadata
- Original Filename: sethc.exe.mui
- Product Name: Microsoft Windows Operating System
- Company Name: Microsoft Corporation
- File Version: 10.0.18362.1 (WinBuild.160101.0800)
- Product Version: 10.0.18362.1
- Language: English (United States)
- Legal Copyright: Microsoft Corporation. All rights reserved.
Possible Misuse
The following table contains possible examples of sethc.exe
being misused. While sethc.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | proc_creation_win_install_reg_debugger_backdoor.yml | - 'sethc.exe' |
DRL 1.0 |
sigma | proc_creation_win_stickykey_like_backdoor.yml | - 'sethc.exe' |
DRL 1.0 |
sigma | proc_creation_win_sticky_keys_unauthenticated_privileged_cmd_access.yml | CommandLine: 'copy /y C:\windows\system32\cmd.exe C:\windows\system32\sethc.exe' |
DRL 1.0 |
sigma | registry_event_stickykey_like_backdoor.yml | - '\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger' |
DRL 1.0 |
atomic-red-team | T1546.008.md | Two common accessibility programs are C:\Windows\System32\sethc.exe , launched when the shift key is pressed five times and C:\Windows\System32\utilman.exe , launched when the Windows + U key combination is pressed. The sethc.exe program is often referred to as “sticky keys”, and has been used by adversaries for unauthenticated access through a remote desktop login screen. (Citation: FireEye Hikit Rootkit) |
MIT License. © 2018 Red Canary |
atomic-red-team | T1546.008.md | | parent_list | Comma separated list of system binaries to which you want to attach each #{attached_process}. Default: “osk.exe” | String | osk.exe, sethc.exe, utilman.exe, magnify.exe, narrator.exe, DisplaySwitch.exe, atbroker.exe| | MIT License. © 2018 Red Canary |
atomic-red-team | T1546.008.md | Replace sticky keys binary (sethc.exe) with cmd.exe | MIT License. © 2018 Red Canary |
atomic-red-team | T1546.008.md | copy C:\Windows\System32\sethc.exe C:\Windows\System32\sethc_backup.exe | MIT License. © 2018 Red Canary |
atomic-red-team | T1546.008.md | takeown /F C:\Windows\System32\sethc.exe /A | MIT License. © 2018 Red Canary |
atomic-red-team | T1546.008.md | icacls C:\Windows\System32\sethc.exe /grant Administrators:F /t | MIT License. © 2018 Red Canary |
atomic-red-team | T1546.008.md | copy /Y C:\Windows\System32\cmd.exe C:\Windows\System32\sethc.exe | MIT License. © 2018 Red Canary |
atomic-red-team | T1546.008.md | copy /Y C:\Windows\System32\sethc_backup.exe C:\Windows\System32\sethc.exe | MIT License. © 2018 Red Canary |
signature-base | cn_pentestset_scripts.yar | $s1 = “success = obj.run("cmd /c takeown /f %SystemRoot%\system32\sethc.exe&echo y| “ ascii /* PEStudio Blacklist: strings */ | CC BY-NC 4.0 |
signature-base | cn_pentestset_tools.yar | description = “Sample from CN Honker Pentest Toolset - file T00ls Lpk Sethc v4.0.exe” | CC BY-NC 4.0 |
signature-base | cn_pentestset_tools.yar | description = “Sample from CN Honker Pentest Toolset - file T00ls Lpk Sethc v3.0.exe” | CC BY-NC 4.0 |
signature-base | cn_pentestset_tools.yar | description = “Sample from CN Honker Pentest Toolset - file T00ls Lpk Sethc v2.exe” | CC BY-NC 4.0 |
signature-base | cn_pentestset_tools.yar | $s2 = “\dllcache\sethc.exe” fullword ascii | CC BY-NC 4.0 |
signature-base | cn_pentestset_tools.yar | $s2 = “\sethc.exe /G everyone:F” fullword ascii /* PEStudio Blacklist: strings */ | CC BY-NC 4.0 |
signature-base | cn_pentestset_tools.yar | $s1 = “\sethc.exe /G everyone:F” fullword ascii /* PEStudio Blacklist: strings */ | CC BY-NC 4.0 |
signature-base | cn_pentestset_tools.yar | $s3 = “\dllcache\sethc.exe” fullword ascii | CC BY-NC 4.0 |
signature-base | cn_pentestset_tools.yar | $s3 = “\sethc.exe /G everyone:F” fullword ascii /* PEStudio Blacklist: strings */ | CC BY-NC 4.0 |
signature-base | thor_inverse_matches.yar | description = “Sethc.exe has been replaced - Indicates Remote Access Hack RDP” | CC BY-NC 4.0 |
signature-base | thor_inverse_matches.yar | $s4 = “SETHC.EXE” wide fullword | CC BY-NC 4.0 |
signature-base | thor_inverse_matches.yar | filename == “sethc.exe” | CC BY-NC 4.0 |
MIT License. Copyright (c) 2020-2021 Strontic.