Overview
The Registry Autoruns check identifies registry entries that automatically execute programs at system startup or user logon, where the executable files have weak permissions. This allows an attacker to replace legitimate autorun binaries with malicious ones for privilege escalation or persistence.How It Works
SharpUp checks multiple autorun registry locations: HKLM Locations:SOFTWARE\Microsoft\Windows\CurrentVersion\RunSOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceSOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunSOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnceSOFTWARE\Microsoft\Windows\CurrentVersion\RunServiceSOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceServiceSOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServiceSOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnceService
- Extracts the executable path using regex
- Checks if the current user can modify the executable
- Reports modifiable autorun binaries
Example Output
Exploitation
Method 1: Replace Autorun Binary
Method 2: Persistence
Remediation
Related Checks
Hijackable Paths
Writable folders in system PATH
Modifiable Scheduled Task
Scheduled tasks with weak permissions