官术网_书友最值得收藏!

The Image File Execution Options key

File paths set in the debugger of the Image File Execution Options key is run when the process is to be debugged or is run with the CreateProcess API:

  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\[Process Name]
    • Debugger = [executable file]
    • [Process Name] pertains to the filename of the running executable
    • This persistence only triggers when there is a need for  [Process Name] to invoke a debugger

Browser Helper Objects key

  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\[CLSID]
    • Having the CLSID as a subkey simply means that it is installed and enabled as an Internet Explorer BHO
    • The CLSID is registered under the HKEY_CLASSES_ROOT\CLSID\[CLSID]\InprocServer32 key
      • The (Default) value points to the DLL file associated with the BHO
    • The DLL file is loaded every time Internet Explorer is opened

Besides registry entries, an executable can also be triggered by schedule using the task scheduler or cron jobs. An executable or a script can be triggered even at certain conditions. Take, for example, the following screenshot of a Windows Task scheduler:

There are many more ways in which malware gets persistence other than those which have been listed previously. These are the challenges that a reverse engineer learns as they encounter new techniques.

主站蜘蛛池模板: 淮滨县| 元氏县| 博客| 镇巴县| 库尔勒市| 阿拉善左旗| 深圳市| 白河县| 潜江市| 三门县| 临安市| 大足县| 谢通门县| 永州市| 延吉市| 自贡市| 安阳县| 石嘴山市| 阳信县| 昆山市| 洞口县| 平远县| 岑巩县| 昭苏县| 兴化市| 安西县| 静宁县| 齐齐哈尔市| 荥经县| 特克斯县| 峨眉山市| 大埔县| 阿克苏市| 景宁| 湘潭县| 浠水县| 克什克腾旗| 方山县| 卢氏县| 长泰县| 潜江市|