|
楼主 |
发表于 2008-10-15 18:24:44
|
显示全部楼层
老多哪,还没完那
29. Script Policies: (Win NT/2000/XP)
[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\System\Scripts]
Startup = C:\winNT\system32\GroupPolicy\Machine\Scripts\Startup
Startup = C:\winNT\system32\GroupPolicy\User\Scripts\Logon
Also, a logon script that only runs for a user when he or she connects to a Terminal Server through the Terminal Server client or by the console can be added by writing to
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"AppSetup"=
30. GinaDLL (Win NT/2000/XP)
Windows NT is shipped to load and execute the standard Microsoft GINA DLL (MSGina.dll). To load a different GINA (Graphical Identification and Authentication dynamic-link library) , a "GinaDLL" value in the following Registry key must be created:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
The GinaDLL value must contain the name of a GINA DLL, which Winlogon will then load and use.
An example of malware using this technique: http://www.sophos.com/virusinfo/analyses/trojgina.html
31. MPRServices (Win 95, 98, ME )
Somewhat analogously to the "Notify" subkey on NT systems, in Win 9x the following Registry key can be used to load a dll:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\MPRServices\"Subkey"
DllName =
EntryPoint =
StackSize =
Examples:
http://securityresponse.symantec ... door.haxdoor.b.html
http://www.trendmicro.com/vinfo/ ... LAMUD.A&VSect=T
http://vil.nai.com/vil/content/v_138991.htm
32. "System" string value in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
"System"= "(Path to) Badfile.exe"
This value is present in Windows versions NT, 2000 and XP. It contains the list of executable files launched by Winlogon in the system context during the system initialisation. This list can be varied by modification of this value.
Examples of malware using this technique:
http://www.symantec.com/business ... 5147-99&tabid=2
http://www.sophos.com/security/analyses/trojzlobaeq.html
33. VMApplet (Win NT/XP)
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"VmApplet"=
This registry value stores the file which is launched by Winlogon process to let the user adjust the virtual memory settings in case the system volume misses the paging swap-file. The file extensions for the file name are not obligatory.
The default value for it is «rundll32 shell32, Control_RunDLL "sysdm.cpl"».
34. Browser Helper objects
A Browser Helper Object or BHO is in effect a small program that runs automatically every time you start your Internet browser.
Every time an instance of Internet Explorer is started, it looks in the registry for CLSIDs stored under the following key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects
If this key exists and there are CLSIDs listed under it, Internet Explorer will try to create an instance of each object listed as a subkey under this key.
Here's the authoritative MS article:
Browser Helper Objects: The Browser the Way You Want It
Examples of malware using this technique:
http://msdn.microsoft.com/librar ... webgen/html/bho.asp
http://www.sophos.com/virusinfo/analyses/trojpuperad.html
http://www.symantec.com/avcenter ... an.smartallyes.html
http://www.sophos.com/virusinfo/analyses/trojlixyb.html
http://no.trendmicro-europe.com/ ... Vname=TROJ_BRIDGE.B
35. The HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options registry key (Windows NT/2000/XP)
A subkey can be added to this regkey by the name of a legitimate application, for example Explorer.exe. In the Explorer.exe subkey create a string value called Debugger, its value data containing the path to a file, say "%Windows%\baddie.exe" , and baddie.exe will be executed every time an instance of explorer.exe is launched.
Examples of malware using this method:
http://vil.nai.com/vil/content/v_142377.htm
http://www.symantec.com/business ... 5154-99&tabid=2
http://www.eset.eu/buxus/generate_page.php?page_id=15027
http://www.symantec.com/enterpri ... 3255-99&tabid=2
36. ContextMenuHandlers
When a user right-clicks a "Shell object", its context menu is displayed. A Context menu handler is a Component Object Model (COM) object that adds commands to such a context menu.
An well known example is the "Open With" context menu entry when right-clicking a file. In the Registry it looks as follows:
[HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Open With]
@="{09799AFB-AD67-11d1-ABCD-00C04FC30936}"
The {09799AFB-AD67-11d1-ABCD-00C04FC30936} Class ID refers to a subkey of the same name in HKEY_CLASSES_ROOT\CLSID, whose InProcServer subkey holds the path to the context handler's dll, in this case Shell32.dll.
Recently this method has also been seen used by malware, for example the Qoologic trojan:
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\gxmmxn]
@="{f1445181-385e-4b9f-ba55-4fec86b25d01}
The InProcServer subkey to HKEY_CLASSES_ROOT\CLSID\{f1445181-385e-4b9f-ba55-4fec86b25d01} will show the path to the 'rogue' dll that's loaded into memory.
Other ContextHandler keys:
HKEY_LOCAL_MACHINE\Software\Classes\AllFileSystemObjects\ShellEx\ContextMenuHandlers
HKEY_CURRENT_USER\Software\Classes\AllFileSystemObjects\ShellEx\ContextMenuHandlers
HKEY_LOCAL_MACHINE\Software\Classes\Folder\ShellEx\ContextMenuHandlers
HKEY_CURRENT_USER\Software\Classes\Folder\ShellEx\ContextMenuHandlers
HKEY_LOCAL_MACHINE\Software\Classes\Directory\ShellEx\ContextMenuHandlers
HKEY_CURRENT_USER\Software\Classes\Directory\ShellEx\ContextMenuHandlers
HKEY_LOCAL_MACHINE\Software\Classes\Directory\Background\ShellEx\ContextMenuHandlers
HKEY_CURRENT_USER\Software\Classes\Directory\Background\ShellEx\ContextMenuHandlers
Further examples of malware making use of this launch point:
http://www.sophos.com/security/analyses/trojcimuze.html
http://www.trendmicro.com/vinfo/ ... OLAID.R&VSect=T
37. The HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\ShellExecuteHooks registry key
The ShellExecuteHooks registry key contains the list of the COM objects (usually dlls) that trap execute commands. The value name equals the GUID (CLSID) of the COM object in question.
Some technical reading on the subject:
Creating a shell extension with C#
http://www.codeproject.com/csharp/dateparser.asp
Logging the Shell Activity
http://www.codeguru.com/Cpp/COM-Tech/shell/article.php/c4515/
Examples of malware using this technique:
http://vil.nai.com/vil/content/v_142170.htm
http://www.symantec.com/avcenter ... tealer.jianghu.html
http://fr.trendmicro-europe.com/ ... Vname=WORM_KORGO.AB
http://www.sophos.com/virusinfo/analyses/trojspytoolgk.html
38. The 'Taskman' string value in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
This value, not installed by default, can be used to launch Task Manager, see here: Have Ctrl-Esc Start Task Manager
You can replace Taskman.exe by any application, and it will be executed at boot!
39. The HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\Utility Manager registry key.
The Utility Manager can be configured to start accessibility programs on Windows startup, so a trojan could be slipped in here by altering the Application Path and setting the "Start with..." field, in the way a legitimate application like Magnify.exe is shown to be registered in this example:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility\Utility Manager\Magnifier]
"Application path"="Magnify.exe"
"Application type"=dword:00000001
"Start with Utility Manager"=dword:00000001
"Start with Windows"=dword:00000001
Eample of malware using this launch method:
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ%5FDLOADER%2EQRQ&VSect=T
In Windows Vista the folowing key is used:
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\Configuration
[ 本帖最后由 tangren 于 2008-10-15 19:41 编辑 ] |
|