Skip to content

Latest commit

 

History

History
67 lines (45 loc) · 4.31 KB

blog14.md

File metadata and controls

67 lines (45 loc) · 4.31 KB

Blog Fourteen: Digital Forensics & Incident Response - Detecting Startup Programs

Detecting potentially malicious startup software introduction

Let's look for clues about the programs running on your PC at startup. You need a basic understanding of the components of the Windows operating system, such as the registry.

The technical goal list

Live Windows VM
Sysinternals

What are startup programs?

The startup locations are configured as startup applications, as well as the full list of file system and registry locations available for startup settings. Startup locations include login entries, Explorer add-ons, and Internet Explorer add-ons, including Browser Helper Objects (BHO). ), Appinit DLLs, image hijacks, boot run images, Winlogon notification DLLs, Windows and Winsock layered service providers, media codecs and more. The autoruns app is excellent for this purpose. Image

The types of persistence and malware

Malware can use persistence techniques to maintain its existence on a compromised network. Persistence techniques can ensure that a hacker can retain access to a system even after rebooting, changing credentials, or other similar interruptions that would otherwise disconnect them. This includes replacing or changing code, inserting startup code, and other actions that an attacker could take on the system. Ensure persistence. The following list describes some common persistence techniques.

Technique Explanation

Registry keys

Regedit is a utility that can be used to hide and run programs that are automatically triggered by the RunOnce keys.

Scheduled Tasks

A task can be scheduled to run a malicious payload at system startup.

Service

Malware can register a service with a binary path that points to a malicious executable program on the hard drive.

Home folder

Malware can persist through a home folder. All executable files in the folder will run at startup.

AppCert DLL

Common DLLs running in any process can get infected.

Bootkit

MBR can be manipulated to load malware on reboot.

The Autoruns application

Image

Try to find clues about persistent programs using the Autoruns application included in the Sysinternals Toolkit. Download and install Autoruns from here: https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns You must absolutely install Autoruns. The executable can be run directly by double-clicking the "Run Now From" link. Autoruns divides the view into several tabs. Use the All tab for a simple search.

Why are you running? WHY ARE YOU RUNNING?

Image

Use autorun to find programs that are marked to run but are no longer installed. If a program is registered to run in the registry at startup, but has been removed without removing the key, the computer will keep trying to run it. These programs are highlighted in yellow. Note that the programs shown in the example may be different for each new system you use. Look for registry keys that contain startup locations (at least three keys). In Autoruns, switch to the Login tab, which lists all the programs activated by the login service. Note that this must be done to filter the output. Triggers can also make programs run automatically. Common registry keys on every computer include

Some critical startup keys:

HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\

Find folders in startup locations.

The Login tab lists information about the programs that the login service activates. In this case, look at the folders. Most Windows versions include: Look for "Not Reviewed" in the Publisher column for each application. During automatic runs, the software labeled "Not Checked" is displayed in red. These are software applications whose publisher is unknown. While unverified software is not necessarily malicious, it should still be verified.

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup
  • C:\Users\JohnD\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup

Image

Thank you!