- Mastering Reverse Engineering
- Reginald Wong
- 206字
- 2021-06-10 19:40:25
The Image File Execution Options key
File paths set in the debugger of the Image File Execution Options key is run when the process is to be debugged or is run with the CreateProcess API:
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\[Process Name]
- Debugger = [executable file]
- [Process Name] pertains to the filename of the running executable
- This persistence only triggers when there is a need for [Process Name] to invoke a debugger
Browser Helper Objects key
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\[CLSID]
- Having the CLSID as a subkey simply means that it is installed and enabled as an Internet Explorer BHO
- The CLSID is registered under the HKEY_CLASSES_ROOT\CLSID\[CLSID]\InprocServer32 key
- The (Default) value points to the DLL file associated with the BHO
- The DLL file is loaded every time Internet Explorer is opened
Besides registry entries, an executable can also be triggered by schedule using the task scheduler or cron jobs. An executable or a script can be triggered even at certain conditions. Take, for example, the following screenshot of a Windows Task scheduler:
There are many more ways in which malware gets persistence other than those which have been listed previously. These are the challenges that a reverse engineer learns as they encounter new techniques.
推薦閱讀
- unidbg逆向工程:原理與實踐
- 網絡空間攻防技術原理
- Learning Python for Forensics
- 零信任網絡:在不可信網絡中構建安全系統
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- Kali Linux Network Scanning Cookbook(Second Edition)
- 網絡安全技術與實訓(第4版)(微課版)
- 信息安全案例教程:技術與應用(第2版)
- Falco云原生安全:Falco原理、實踐與擴展
- 隱私計算
- 網絡安全大數據分析與實戰
- 華為Anti-DDoS技術漫談
- Mastering Metasploit
- Learn Azure Sentinel
- 云計算安全:關鍵技術、原理及應用