Skip to content

Persistence Categories

Josh Brower edited this page May 23, 2016 · 2 revisions

Autoruns Persistence Categories

The following are the various categories of persistence locations that the current version of Autoruns lists. Each category is explained 1,2 as are suggestions on what to look for. Data stacking is a key part of the process - if you are unfamiliar with it, Mandiant has a good introduction to it3.

Drivers - Shows all non-disabled drivers at the time of log generation
-ELSA Query: groupby:path - Show all results outside of the system32 & syswow64 Folders
-ELSA Query: Look for unsigned drivers

Explorer - Shell extensions, addons, etc
-ELSA Query: groupby:path - Stack

Services - Shows all Autostart services on the system at the time of log generation
-ELSA Query: groupby:path - Show all results outside of the System32 Folder - Stack
-ELSA Query: groupby:company - Stack
Malware Example: Hupigon family backdoor

Codecs- Shows all codecs loaded at the time of log generation
-ELSA Query: groupby:path - Stack

Tasks - Shows all registered tasks on the system at the time of log generation
-ELSA Query: groupby:path - Stack

Winlogon - Winlogon entries
-ELSA Query: groupby:path - Stack

KnownDLLs - Cached DLLs4
-ELSA Query: Confirm that everything listed is a verified Windows component.
-ELSA Query: Confirm that everything listed is found in the system directory5

Network Providers - Winsock protocol and network providers
-ELSA Query: groupby:path - Stack

Logon - Common Startup areas including Run & RunOnce keys, Start Menu, etc.
-ELSA Query: groupby:path, +users - Stack
-ELSA Query: groupby:company - Stack

LSA Providers - LSA security providers
-ELSA Query: groupby:path - Stack

Print Monitors - Printer monitor DLLs
-ELSA Query: Path: Show all results outside of the System32 Folder - Stack
-ELSA Query: Company: Out of ordinary companies?

Boot Execute - Startup during system boot
-ELSA Query: groupby:path - Closely review any non-Microsoft entries

Internet Explorer - Shows all IE Addons at the time of log generation
-ELSA Query: groupby:path - Stack

Office Addins - Shows all office addins at the time of log generation
-ELSA Query: groupby:path - Stack

Hijacks - Shows all image hijacks at the time of log generation
-ELSA Query: groupby:path - Closely review any entries
Malware Example: Adware hijacking Tasklist.exe

WMI - WMI Entries at the time of log generation
-ELSA Query: groupby:path - Stack

References:

Clone this wiki locally