Vault7: CIA Hacking Tools Revealed
Navigation: » Latest version
Owner: User #71468
Run and RunOnce Registry Key Persistence (PSEDRunKey_QW - Quick Work)
SECRET//NOFORN
OSB Library: Persistence
Module Name: PSEDRunKey_QW (Quick Work)
Module Description: This module creates a registry key entry with a command line that runs each time a user logs on. This is the "standard" Windows way to have programs run at start-up. If running as Administrator or SYSTEM, the key will be written in HKEY_LOCAL_MACHINE, causing execution upon boot up. Otherwise, the key will be written in HKEY_CURRENT_USER, causing execution to occur only when the current user logs in. The module allows the user to specify whether the command should be written to the Run or RunOnce registry folder. Keys written to RunOnce will be removed after calling and thus the code should perpetually re-write to RunOnce on execution in order to persist. Keys written to the Run folder will not be removed. The module writes to one of the following registry keys:
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
PSP/OS Issues: No known issues
('excerpt' missing)
Sharing Level: Liaison
Technique Origin: Internet/open-source
Notes:
- The module uses IsUserAnAdmin() to determine if key can be written to HKEY_LOCAL_MACHINE
- Setting isDLL flag to true prepends "rundll32.exe" and appends ordinal entry number
- Prefixing wcKeyValueName with "*" (asterisk) will cause command to execute in Safe Mode (otherwise detault is to ignore in Safe Mode)
Module Specific Structures:
struct RunKeyInfo{
unsigned int ordinal; // The ordinal to call. Only used if isDLL is set to true
WCHAR * wcKeyValueName; // The name of registry entry
bool isDLL; // Boolean for if persisted module is dll
bool runOnce; // Boolean for if module should persist in RunOnceKey
RunKeyInfo(void) : ordinal(0), isDLL(false), runOnce(false) {}; // Set default values
};
Example Code:
PSEDRunKey_QW rkqw;
RunKeyInfo exeRKI;
exeRKI.wcKeyValueName = L"exeName";
RunKeyInfo dllRKI;
dllRKI.wcKeyValueName = L"dllName";
dllRKI.isDLL = true;
dllRKI.ordinal = 1;
RunKeyInfo onceRKI;
onceRKI.wcKeyValueName = L"onceName";
onceRKI.runOnce = true;
rkqw.PersistPayload(L"C:\\TestFolder\\Payload.exe", &exeRKI)); // Create .exe key in Run folder
rkqw.PersistPayload(L"C:\\TestFolder\\PayloadDLL.dll", &dllRKI)); // Create DLLDynamic Link Library key in Run folder that calls ordinal #1
rkqw.PersistPayload(L"C:\\TestFolder\\Payload.exe", &onceRKI)); // Create .exe key in RunOnce folder that will be removed after calling
// Remove all persisted modules
rkqw.RemovePersistence(&exeRKI)
rkqw.RemovePersistence(&dllRKI)
rkqw.RemovePersistence(&onceRKI) // Superfluous since should be deleted after calling
SECRET//NOFORN