官术网_书友最值得收藏!

The Image File Execution Options key

File paths set in the debugger of the Image File Execution Options key is run when the process is to be debugged or is run with the CreateProcess API:

  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\[Process Name]
    • Debugger = [executable file]
    • [Process Name] pertains to the filename of the running executable
    • This persistence only triggers when there is a need for  [Process Name] to invoke a debugger

Browser Helper Objects key

  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\[CLSID]
    • Having the CLSID as a subkey simply means that it is installed and enabled as an Internet Explorer BHO
    • The CLSID is registered under the HKEY_CLASSES_ROOT\CLSID\[CLSID]\InprocServer32 key
      • The (Default) value points to the DLL file associated with the BHO
    • The DLL file is loaded every time Internet Explorer is opened

Besides registry entries, an executable can also be triggered by schedule using the task scheduler or cron jobs. An executable or a script can be triggered even at certain conditions. Take, for example, the following screenshot of a Windows Task scheduler:

There are many more ways in which malware gets persistence other than those which have been listed previously. These are the challenges that a reverse engineer learns as they encounter new techniques.

主站蜘蛛池模板: 通海县| 香格里拉县| 和顺县| 班玛县| 惠州市| 安达市| 遵化市| 综艺| 莱芜市| 巴彦淖尔市| 大同县| 石柱| 渝北区| 建瓯市| 宜兰市| 修武县| 金山区| 米脂县| 扶余县| 丹寨县| 徐水县| 衡东县| 文安县| 普安县| 浑源县| 交口县| 宿迁市| 汝阳县| 淳化县| 甘德县| 加查县| 乌恰县| 邮箱| 望奎县| 绥中县| 新郑市| 双峰县| 咸丰县| 乐平市| 安多县| 六枝特区|