- Mastering Reverse Engineering
- Reginald Wong
- 188字
- 2021-06-10 19:40:24
Persistence
One of the changes malware makes in the system is to make itself resident. Malware persistence means that the malware will still be running in background and, as much as possible, all the time. For example, malware gets executed after every boot-up of the system, or malware gets executed at a certain time of the day. The most common way for malware to achieve persistence is to drop a copy of itself in some folder in the system and make an entry in the registry.
The following view of the registry editor shows a registry entry by the GlobeImposter ransomware:

Any entries made under the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Run are expected to run every time Windows starts. In this case, the GlobeImposter ransomware's executable file stored in C:\Users\JuanIsip\AppData\Roaming\huVyja.exe becomes persistent. BrowserUpdateCheck is the registry value, while the path is the registry data. What matters under this registry key are the paths, regardless of the registry value name.
There are several areas in the registry that can trigger the execution of a malware executable file.
- 腦洞大開:滲透測(cè)試另類實(shí)戰(zhàn)攻略
- 為你護(hù)航:網(wǎng)絡(luò)空間安全科普讀本(第2版)
- Kali Linux Social Engineering
- Practical Network Scanning
- 可信計(jì)算3.0工程初步
- .NET安全攻防指南(上冊(cè))
- 同態(tài)密碼學(xué)原理及算法
- 信息安全等級(jí)保護(hù)測(cè)評(píng)與整改指導(dǎo)手冊(cè)
- 信息技術(shù)基礎(chǔ):提高篇·實(shí)驗(yàn)與習(xí)題
- 網(wǎng)絡(luò)空間安全:拒絕服務(wù)攻擊檢測(cè)與防御
- Mastering Malware Analysis
- 交換機(jī)·路由器·防火墻(第2版)
- 云計(jì)算安全:關(guān)鍵技術(shù)、原理及應(yīng)用
- 網(wǎng)絡(luò)空間安全實(shí)戰(zhàn)基礎(chǔ)
- Real-World SRE