Andy Ful
From Hard_Configurator Tools
Thread author
Verified
Honorary Member
Top Poster
Developer
Well-known
- Dec 23, 2014
- 8,970
Very interesting document (a research paper by Kyle Hanslovan and Chris Bisnett ) about how to use properly Sysinternals Autoruns program. There are many possible techniques which can hide malicious entries when using default Autoruns settings. The first simple example (among many others) is to replace the autorun entry:
C:\Windows\system32\VBoxTry.exe
with modified one:
cmd.exe /c start C:\Windows\system32\VBoxTry.exe & malware.exe
This command runs malware.exe after executing the autorun VBoxTry.exe .
You will see in the Autoruns window the entry C:\Windows\system32\VBoxTry.exe only when 'Hide Windows Entries' option is unticked. But even then, the whole command is not visible. It can be seen below the main window, when clicking on the C:\Windows\system32\VBoxTry.exe entry.
Good reading for malware testers.
.
See also:
Evading Autoruns, or: don’t rely solely on Autoruns for security
C:\Windows\system32\VBoxTry.exe
with modified one:
cmd.exe /c start C:\Windows\system32\VBoxTry.exe & malware.exe
This command runs malware.exe after executing the autorun VBoxTry.exe .
You will see in the Autoruns window the entry C:\Windows\system32\VBoxTry.exe only when 'Hide Windows Entries' option is unticked. But even then, the whole command is not visible. It can be seen below the main window, when clicking on the C:\Windows\system32\VBoxTry.exe entry.
Good reading for malware testers.
.
See also:
Evading Autoruns, or: don’t rely solely on Autoruns for security
Last edited: