Skip to content

Latest commit

 

History

History
42 lines (26 loc) · 1 KB

ifeo.md

File metadata and controls

42 lines (26 loc) · 1 KB

Image File Execution Options

Location:

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\

Classification:

Criteria Value
Permissions Admin
Security context User; System1
Persistence type Registry
Code type EXE
Launch type Automatic; Any logon required; User initiated2
Impact Destructive3
OS Version All OS versions
Dependencies OS only
Toolset Scriptable

Description:

Well known key. If there is a subkey with a name matching the exe file name, the Debugger REG_SZ value is being read and launched with the original exe passed as parameter. Effectively it leads to image hijacking, as the configured exe is launched instead of the desired one.

References:

https://blog.malwarebytes.com/101/2015/12/an-introduction-to-image-file-execution-options/

Credits:

See also:

Remarks:

Footnotes

  1. Depends on the image being hijacked

  2. Depends on the image being hijacked

  3. The original exe will not start