Overview
The Registry Autoruns check identifies registry entries that automatically execute programs at system startup or user logon, where the executable files have weak permissions. This allows an attacker to replace legitimate autorun binaries with malicious ones for privilege escalation or persistence.How It Works
SharpUp checks multiple autorun registry locations: HKLM Locations:SOFTWARE\Microsoft\Windows\CurrentVersion\RunSOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceSOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunSOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnceSOFTWARE\Microsoft\Windows\CurrentVersion\RunServiceSOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceServiceSOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServiceSOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnceService
- Extracts the executable path using regex
- Checks if the current user can modify the executable
- Reports modifiable autorun binaries
Example Output
Exploitation
Method 1: Replace Autorun Binary
Method 2: Persistence
Remediation
1
Identify Modifiable Autoruns
2
Secure Autorun Binaries
3
Remove Unnecessary Autoruns