Skip to content

Releases: p0w3rsh3ll/AutoRuns

Release version 14.0.2

19 May 09:17
a08e997
Compare
Choose a tag to compare

Changes and fixes in this release 14.0.2

The module files aren't signed with a Digicert certificate anymore since version 14.0.1

Fixed issues:

  • Issue 109: ImagePath for SID 500 is wrong #109
  • Issue 110: Another anti-cheat driver #110
  • Issue 112: Issue with FACEIT #112
  • Issue 113: Issue with driver on another drive #113
  • Issue 114: Scheduled task with .exe in SysWOW64 #114
  • Issue 115: Scheduled task using %windir% #115
  • Issue 116: Filepath for group policies #116

Release version 14.0.1

15 Jan 13:56
f1fbde5
Compare
Choose a tag to compare

Changes and fixes in this release 14.0.1

The module files aren't signed with a Digicert certificate anymore

Fixed issues:

  • Issue 98: PRM driver ImagePath #98
  • Issue 100: WinSXS pending #100
  • Issue 101: OneDrive Reporting task #101
  • Issue 102: ImagePath of cmd based scheduled task #102
  • Issue 103: Issue with firefox update task #103
  • Issue 104: Issue with HP scheduled task #104
  • Issue 105: Issue with HP scheduled task #105
  • Issue 106: Issue with Office Feature Updates scheduled task #106
  • Issue 107: Issue with the HP Consent Manager Launcher scheduled task #107

Release version 14.0

05 Sep 15:43
8ce2eaa
Compare
Choose a tag to compare

Changes and fixes in this release 14.0

# New in 14.0
HKLM\SOFTWARE\Microsoft\Windows CE Services\AutoStartDisconnect
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal Server\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKLM\Software\Wow6432Node\Microsoft\Ctf\LangBarAddin
HKLM\Software\Wow6432Node\Classes\Filter
HKCU\SOFTWARE\Wow6432Node\Microsoft\Office test\Special\Perf\(Default)
HKLM\SOFTWARE\Wow6432Node\Microsoft\Office test\Special\Perf\(Default)

# Was in 13.99
HKLM\SOFTWARE\Microsoft\Windows CE Services\AutoStartOnDisconnect 
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\Run

Release version 13.99

22 May 15:59
6e76be0
Compare
Choose a tag to compare

Changes and fixes in this release 13.99

Fixed issues:

  • Issue 87: Startup (shell folders and user shell folders) #87
# Back in 13.99
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Common Startup
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Startup
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Startup
# Was in 13.88
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup
%USERPROFILE%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
C:\Users\local-user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup

The registry key are back and show below the files present in these locations and their target (if its a .lnk)
  • Issue 88: Logon new locations introduced in 13.99 #88
Not mentioned in the official release notes but the new 13.99 looks for the 2 new keys and values:

HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AltStartup 
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Common AltStartup

Release version 13.98.1

10 Apr 16:48
25726c0
Compare
Choose a tag to compare

Changes and fixes in this release 13.98.1

New functions:

Fixed issues:

  • Issue 84: Logon category HCKU...\Run ImagePath is empty for C:\ProgramData...\exe #84
  • Issue 82: Get-PSAutorun -VerifyDigitalSignature throws Illegal characters in path #82
  • Issue 80: Test-Path throws 'Illegal characters in path.' #80
  • Issue 78: Error thrown in PS 7.0.x with the Logon category #78

Release version 13.98

27 Jun 15:27
f8855ea
Compare
Choose a tag to compare

Changes and fixes in this release 13.98

  • Update internal Get-FileHash function (issue #77)

The internal Get-FileHash function has been actually removed from the module and the minimum PS version required to run this module has been increased from 3.0 to 4.0.

  • Fixed issue #78 : Error thrown in PS 7.0.x with the Logon category
    The parameter of Get-Content needed to be changed when it runs in Windows PowerShell or in PowerShell see 85d9502

  • Fixed issue #74 : the ImagePath of Printer port d1f3218

  • Added detection for printdaemon CVE-2020-1048 (issue #71) see 2d6bf06

  • Fixed the Teams imagepath issue #70 see bf7cc18

  • Added the first version of Pester tests 278d247

Release version 13.95

09 Feb 17:07
Compare
Choose a tag to compare

Changes and fixes in this release 13.95

  • Add support for user shell folders (issue #58)

  • Adding a -Raw parameter (issue #56)
    The output is the result of the core private function Get-PSRawAutoRun. This is the way artifacts are being read. There are no modification or any attempt to "prettify" anything. It's incompatible with the -ShowFileHash and -VerifyDigitalSignature parameters.

Get-PSAutorun -Raw | ogv
  • Handle PowerShell profiles (may not be exhaustive because it depends on the host) (see issue #12 ). A new parameter -PSProfiles parameter has been added for this purpose.
Get-PSAutorun -PSProfiles

Path          : C:\Windows\System32\WindowsPowerShell\v1.0
Item          : profile.ps1
Category      : PowerShell profiles
Value         : C:\Windows\System32\WindowsPowerShell\v1.0\profile.ps1
ImagePath     : C:\Windows\System32\WindowsPowerShell\v1.0\profile.ps1
  • Detect correctly the scheduled task UninstallSMB1ClientTask & UninstallSMB1ServerTask (see issue #62 )
Value         : %windir%\system32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Unrestricted -NonInteractive -NoProfile -WindowStyle Hidden "&  %windir%\system32\WindowsPowerShell\v1.0\Modules\SmbShare\DisableUnusedSmb1.ps1 -Scenario Client"
  • Detect correctly the scheduled task (see issue #60 and #59 )
Path          : C:\WINDOWS\system32\Tasks\Microsoft\Windows\Conexant\MicTray
Item          : MicTray
Category      : Task
Value         : "C:\Windows\System32\MicTray64.exe"
ImagePath     : C:\Windows\System32\MicTray64.exe

Path          : C:\WINDOWS\system32\Tasks\Microsoft\Windows\Conexant\SA3
Item          : SA3
Category      : Task
Value         : "C:\Program Files\CONEXANT\SA3\HP-NB-AIO\SACpl.exe" /sa3 /nv:3.0+ /uid:HP-NB-AIO /s /dne
ImagePath     : C:\Program Files\CONEXANT\SA3\HP-NB-AIO\SACpl.exe
  • Detect correctly the scheduled task for the Dropbox binary (see issue #63 )
Value         : C:\Users\username\AppData\Local\Dropbox\Update\DropboxUpdate.exe /c
ImagePath     : C:\Users\username\AppData\Local\Dropbox\Update\DropboxUpdate.exe

Value         : C:\Users\username\AppData\Local\Dropbox\Update\DropboxUpdate.exe /ua /installsource scheduler
ImagePath     : C:\Users\username\AppData\Local\Dropbox\Update\DropboxUpdate.exe
  • Detect correctly the Dropbox binary in the logon category (see issue #64 )
Path          : C:\Users\username\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Item          : Dropbox.lnk
Category      : Logon
Value         : C:\Users\username\AppData\Roaming\Dropbox\bin\Dropbox.exe /systemstartup
ImagePath     : C:\Users\username\AppData\Roaming\Dropbox\bin\Dropbox.exe

Release version 13.94

26 Feb 20:14
Compare
Choose a tag to compare

Changes and fixes in this release 13.94

  • Detect correctly the scheduled task Server Manager Performance Monitor (see issue #49)
Value         : %systemroot%\system32\rundll32.exe %systemroot%\system32\pla.dll,PlaHost "Server Manager Performance Monitor" "$(Arg0)"
ImagePath     : C:\WINDOWS\system32\pla.dll
  • Detect correctly the scheduled task CleanupOldPerfLogs (see issue #50 )
Value         : %systemroot%\system32\cscript.exe /B /nologo %systemroot%\system32\calluxxprovider.vbs $(Arg0) $(Arg1)
ImagePath     : C:\WINDOWS\system32\calluxxprovider.vbs
  • Detect correctly the MSiSCSIInitiatorProvider WMI provider (see issue #51)
Value         : %SystemRoot%\System32\iscsiwmi.dll
ImagePath     : C:\Windows\System32\iscsiwmi.dll
  • Detect correctly a driver located in the 32bit Windows path (see issue #52)
Value         : SysWow64\drivers\AsUpIO.sys
ImagePath     : C:\Windows\SysWow64\drivers\AsUpIO.sys
  • Partial fix fo the issue #53: wrong imagepath when the service value targets a file w/o extension
Value         : C:\Windows\system32\ibtsiva
ImagePath     : C:\Windows\system32\ibtsiva

Release version 13.90.1

13 Jul 12:22
f9685b6
Compare
Choose a tag to compare

Changes and fixes in this release 13.90.1

  • Detect subfolders under all RunOnceEx registry key (see issue #18 ). Splits on pipe character if anything is found.

  • Adding new User parameter. It's a dynamic parameter.
    It scans the Security Identifiers (SID) found under HKEY_USERS and displays them translated to an account name.
    A wildcard characted indicates that all SID found under HKEY_USERS will be scanned. The User dynamic parameter is not mandatory and by default only the HKCU hive will be scanned.

Release version 13.82.1

25 Jun 11:26
Compare
Choose a tag to compare

Changes and fixes in this release 13.82.1

  • Detect drivers and services in C:\ProgramData, regex was wrong (see issue #19)
"C:\ProgramData\Microsoft\Windows Defender\platform\4.12.17007.18022-0\MsMpEng.exe"
  • Detect drivers and services in C:\Program Files, regex was wrong (see issue #20)
\??\C:\Program Files\Logitech Gaming Software\Drivers\LgCoreTemp\lgcoretemp.sys
  • Add correct imagepath detection of KnownDLLs: Wow64.dll,Wow64cpu.dll,Wow64win.dll (see issue #21)
    These files only exist in System32 and wowarmhw.dll is not found on a x64 platform

  • Detect Windows Defender scheduled tasks that runs C:\ProgramData....*.exe (see issue #22)

  • Detect file iexplore.exe from htmlfile item in ImageHijacks category (see issue #23)

  • Detect the correct path of unregmp2.exe in Logon category (see issue #24)

  • OfficeAddins have a correct imagepath when HKCU hive is in use (see issue #26)

  • New detection added for persistence using GlobalFlags in Image File Execution Options (see issue #27)

  • Detect drivers and services such as (see issue #30 )

\??\C:\Program Files (x86)\Common Files\BattlEye\BEDaisy.sys
  • Detect scheduled tasks that run directly a vbscript (see issue #31)
C:\Program Files (x86)\Mirillis\Action!\Action.vbs
  • Detect scheduled tasks that run directly a .bat file (see issue #32)
"C:\Program Files\action.bat"
  • Instead of returning the image path of powershell.exe, returns the path of the script launched (see issue #33)
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -Exec Bypass -File c:\windows\system32\logoff.ps1
  • When ShowFileHash and VerifyDigitalSignature switches are used, don't drop items that have a problem with their ImagePath property because they may be malicious. If the ImagePath has a value and Test-Path doesn't equal true, the object in the pipeline was dropped by the internal Add-PSAutoRunAuthentiCodeSignature function. (see issue #34)

  • Scheduled tasks with multiple programs started are correctly detected. (see issue #36)

  • Fix regular expression so that it detects a script enclosed in quotes (see issue #37)

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -NoProfile -File "C:\Windows\TTest.ps1" -CustomParam
  • Fix the case in the regular expression used to detect a scheduled task (see issue #38)

  • Detect services if they are located in c:\packages (see issue #40)

"C:\Packages\Plugins\Microsoft.EnterpriseCloud.Monitoring.MicrosoftMonitoringAgent\1.0.11081.4\MMAExtensionHeartbeatService.exe"
  • Fix regular expression used to detect a PowerShell script (see issue #41)
 %SystemRoot%\System32\WindowsPowerShell\v1.0\powershell.exe -NonInteractive -File "C:\Program Files\Microsoft Monitoring Agent\Agent\Tools\UpdateOMCert.ps1" -OldCertHash $(OldCertHash) -NewCertHash $(NewCertHash) -EventRecordId $(EventRecordId)