🖥️
Windows DFIR
  • Introduction
  • Windows Artifacts
    • Windows Quick Tips
      • Windows Command Line
      • Workstation File/Folder Locations
      • Server File/Folder Locations
    • Account Usage
      • Authentications SAM Artifacts
        • Last Login
        • Last Failed Login
        • Last Password Change
      • Authentications (Windows Event Log)
        • Logon ID
      • Group Membership
        • Event ID: 4798
        • Event ID: 4799
      • RDP
        • Source System Artifacts - Quick Reference
        • Destination System Artifacts - Quick Reference
      • SSH
      • Rouge Local Accounts
      • CrowdStrike Searches
        • Event Name - UserLogon
        • Event Name - UserLogonFailed
        • Event Name - UserLogonFailed2
        • Event Name - SsoApplicationAccess
    • Browser Usage
      • History & Downloads
        • Viewing History Files - DB Browser
        • Transition Types
      • Auto-Complete Data
      • Bookmarks
      • Browser Preferences
      • Cache
      • Cookies
      • Extensions
      • Super Cookies (HTML5 Web Storage)
      • Media History
      • Private Browsing
      • Session Restore
      • Stored Credentials
      • Suggested/Frequent Sites
      • DB Browser Queries
        • Firefox
        • Chrome
        • Media History
      • PowerShell Scripts
        • Browser Extension Finder
        • Browser History Finder
    • Processes
      • at.exe
      • explorer.exe
      • lsass.exe
      • lsaiso.exe
      • PuTTy.exe
        • X11 Forwarding
      • runtimebroker.exe
      • services.exe
      • smss.exe
      • System
      • svchost.exe
        • Services
      • winlogon.exe
      • wininit.exe
    • Cloud Storage
    • Deleted File or File Knowledge
      • WordWheelQuery (Win 7+)
      • ACMRU (Win XP)
      • Internet Explorer file:///
      • Last Visited MRU
      • Thumbs.db (Win XP)
      • Thumbcache
      • Recycle Bin
      • User Typed Paths
      • Windows Search Database
    • File Download
      • Zone.Identifer
      • Open/Save Most Recently Used (MRU)
      • Email
      • Drive By Downloads
        • Malvertising
      • Web Browsing
        • Cache Files
      • CrowdStrike Searches
        • MoTW
    • Folder/File Opening/Creation
      • Recent Files
      • Office Recent Files
      • Shell Bags
      • .lnk Files
      • Jump Lists
        • AppIDs
      • Prefetch
      • Index.dat file://
      • PowerShell Scripts
        • .lnk Files
    • Persistence
      • Registry
        • NTUSER.DAT & HKU\SID
        • Run and Run Once
        • Shell Folders and UserInit Key
        • Services
        • Logon Scripts
        • Office Add-ins
        • Winlogon Shell
        • Image File Execution Options (IFEO)
        • AppInit_DLLs
        • Scheduled Tasks
      • Scheduled Tasks
        • Scheduled Task Destination System Artifacts
        • Scheduled Task Source System Artifacts
      • Startup
      • Tool: AutoRuns
      • Accounts
      • WMI Event Consumers
        • WMI: Source System Artifacts
        • WMI: Destination System Artifacts
        • WMI: PowerShell Analysis
      • PowerShell Scripts
        • Startup Programs
      • CrowdStrike Searches
        • Files Written to Startup Folder
        • Files Written to Startup Folder from the Internet
        • Local Account Creation/Deletion
        • Azure Account Creation/Deletion
        • Scheduled Tasks
    • Physical Location
      • Time zone
      • Wireless SSID
      • Network History (Vista/Win7–11)
      • Cookies
      • Browser Search Terms
    • Program Execution
      • Prefetch
        • Decoding Prefetch Files with Eric Zimmerman's PECmd Tool
      • BAM/DAM
      • CapabilityAccessManager
      • UserAssist
      • Last Visited MRU
      • RunMRU
      • MUI Cache
      • ShimCache
      • Amcache
      • Jump Lists
    • Shadow Copies
      • VSC Permissions
      • Event ID 8193: Volume Shadow Copy Service Error
    • USB Usage
      • Key Identification
      • Drive Letter and Volume Name
      • Connection Timestamps
      • User
      • Volume Name
      • Plug & Play Event Log
    • Windows Services
      • DoSvc (Delivery Optimization)
    • System Information
    • Event IDs
      • Authentication / Account
        • 4624 - Authentication Success
          • Logon Types
        • 4625 - Authentication Failure
          • SubStatus Codes
        • 4634 - Account Logoff
        • 4648 - Explicit Credentials Success
        • 4672 - Special Privileges
        • 4720 - Account Creation
        • 4722 - Account Enabled
        • 4732 - Addition to Local Group
        • 4738 - Account Changed
        • 4776 - Kerberos Authentication Attempt
          • Substatus Codes
        • 4771 - Kerberos Failure
        • 4768
      • File System
        • 1006
        • 4688 - Process Created
        • 4663
        • 4656
        • 6416
        • 20001
        • 20003
  • Windows DFIR & MITTR
    • Initial Access
      • Content Injection
      • Drive-by Compromise
        • Watering Hole Attack
        • Microsoft Files (Payload Execution)
        • Exploit Delivery
        • Viewing Browser History Files
      • Phishing
    • Execution
    • Persistence
    • Privilege Escalation
    • Defense Evasion
    • Credential Access
      • Logon ID
    • Discovery
    • Lateral Movement
    • Collection
    • Command and Control
    • Exfiltration
    • Impact
  • SOC Related
    • Cached Credentials
    • Domain Controller Password Spraying
Powered by GitBook
On this page
  • Key Features
  • How Autoruns Works
  • Using Autoruns for Malicious Activity Detection
  • Security Considerations

Was this helpful?

  1. Windows Artifacts
  2. Persistence

Tool: AutoRuns

Autoruns is a powerful utility from Microsoft Sysinternals that provides an exhaustive overview of all applications and scripts configured to run automatically on a Windows system. This tool is invaluable for system administrators and security professionals for diagnosing performance issues and detecting malware. Autoruns scans and displays the entries in order of the process execution: from boot-up to user login, covering a wide range of autostart locations.

Key Features

  • Extensive Autostart Location Scanning: Autoruns is more comprehensive than the built-in Windows tools like MSConfig or Task Manager. It scans over a dozen places where autostart commands can be hidden, including but not limited to:

    • Run and RunOnce registry keys

    • Startup folders

    • Windows Services

    • Drivers

    • Winlogon notifications

    • Scheduled tasks

    • Browser helper objects (BHOs), toolbars, and extensions for Internet Explorer, Chrome, and Firefox.

  • Filtering and Search: Users can filter out Microsoft and Windows entries to focus on third-party applications, making it easier to spot potentially unwanted programs or malware. A search function allows for quick filtering of results based on keywords.

  • Digital Signature Checks: Autoruns can verify digital signatures of auto-starting images to distinguish legitimate applications from potentially malicious ones. Unsigned or improperly signed files are flagged, drawing immediate attention.

  • Hide Safe Entries: An option to hide verified Microsoft services reduces clutter and helps users concentrate on third-party applications that are more likely to be malicious.

  • Command-line Version: Autoruns also includes Autorunsc, a command-line version that can be used for scripting or integration with other tools, enabling automated scans and reports.

How Autoruns Works

Autoruns operates by querying dozens of registry keys and folder paths where autostart commands can be stored, including:

  • HKLM and HKCU Software\Microsoft\Windows\CurrentVersion\Run keys for application startup commands.

  • The Start Menu\Programs\Startup folders for current user and all users.

  • Services and drivers configured to start automatically.

  • Scheduled tasks with triggers set at logon or system startup.

  • Explorer shell extensions, browser helper objects, and other plugins that load with web browsers or the explorer process.

Using Autoruns for Malicious Activity Detection

  • Malware and Persistence Mechanisms: Malware often relies on autostart mechanisms to ensure it runs every time the system starts. Autoruns can uncover these persistence mechanisms by showing every application configured to start automatically, including those hidden from the user.

  • Analysis and Remediation: By identifying and examining suspicious or unknown entries, users can take steps to disable or remove unwanted applications. This is crucial in the process of malware removal and system clean-up.

  • System Auditing: Regular scans with Autoruns can serve as part of a routine security audit, ensuring that only authorized applications are configured to run at startup.

Security Considerations

  • Accurate Malware Identification: Users must exercise caution and conduct thorough research before deeming an autostart entry as malicious to avoid false positives.

  • Risk of System Instability: Disabling or removing legitimate system processes or applications can lead to system instability or failure. It's recommended to have a system restore point or backup before making changes.

  • Elevation of Privilege: Autoruns should be run with administrative privileges to ensure a complete scan of all locations, including those requiring elevated access to view or modify.

PreviousStartupNextAccounts

Last updated 1 year ago

Was this helpful?