Autodial DLL
Location:
HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\AutodialDLL
Classification:
| Criteria | Value |
|---|---|
| Permissions | Admin |
| Security context | System1 |
| Persistence type | Registry |
| Code type | DLL |
| Launch type | Automatic2 |
| Impact | Non-destructive3 |
| OS Version | All OS versions |
| Dependencies | OS only |
| Toolset | Scriptable |
Description:
When Winsock library connects to the internet it ‘talks’ to various service providers and probes them for connectivity services. […] At some stage it attempts to load a DLL as specified by the following Registry key:
HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\AutodialDLLThis key is quite obscure and Microsoft only describes it in a context of a very old vulnerability MS06-041. Turns out that the AutodialDLL entry points to a DLL that WinSock will load anytime it connects to the internet. The DLL needs to export 3 functions:
- WSAttemptAutodialAddr
- WSAttemptAutodialName
- WSNoteSuccessfulHostentLookup
References:
https://www.hexacorn.com/blog/2015/01/13/beyond-good-ol-run-key-part-24/