Image File Execution Options
Location:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\
Classification:
Criteria | Value |
---|---|
Permissions | Admin |
Security context | User; System1 |
Persistence type | Registry |
Code type | EXE |
Launch type | Automatic; Any logon required; User initiated2 |
Impact | Destructive3 |
OS Version | All OS versions |
Dependencies | OS only |
Toolset | Scriptable |
Description:
Well known key. If there is a subkey with a name matching the exe file name, the Debugger
REG_SZ value is being read and launched with the original exe passed as parameter.
Effectively it leads to image hijacking, as the configured exe is launched instead of the desired one.
References:
https://blog.malwarebytes.com/101/2015/12/an-introduction-to-image-file-execution-options/