#----------------------------------------------------------- # shellexec # Get ShellExecuteHooks values from Software hive (based on BHO # code) # # ShellExecuteHooks are DLLs that load as part of the Explorer.exe process, # and can intercept commands. There are some legitimate applications that # run as ShellExecuteHooks, but many times, malware (spy-, ad-ware) will # install here. ShellExecuteHooks allow you to type a URL into the Start->Run # box and have that URL opened in your browser. For example, in 2001, Michael # Dunn wrote KBLaunch, a ShellExecuteHook that looked for "?q" in the Run box # and would open the appropriate MS KB article. # # Refs: # http://support.microsoft.com/kb/914922 # http://support.microsoft.com/kb/170918 # http://support.microsoft.com/kb/943460 # # History: # 20081229 - initial creation # # copyright 2008 H. Carvey, keydet89@yahoo.com #----------------------------------------------------------- package shellexec; use strict; my %config = (hive => "Software", hasShortDescr => 1, hasDescr => 0, hasRefs => 0, osmask => 22, version => 20081229); sub getConfig{return %config} sub getShortDescr { return "Gets ShellExecuteHooks from Software hive"; } sub getDescr{} sub getRefs {} sub getHive {return $config{hive};} sub getVersion {return $config{version};} my $VERSION = getVersion(); sub pluginmain { my $class = shift; my $hive = shift; my %bhos; ::logMsg("Launching shellexec v.".$VERSION); my $reg = Parse::Win32Registry->new($hive); my $root_key = $reg->get_root_key; my $key_path = "Microsoft\\Windows\\CurrentVersion\\Explorer\\ShellExecuteHooks";; my $key; if ($key = $root_key->get_subkey($key_path)) { ::rptMsg($key_path); ::rptMsg("LastWrite Time ".gmtime($key->get_timestamp())." (UTC)"); ::rptMsg(""); my @vals = $key->get_list_of_values(); if (scalar (@vals) > 0) { foreach my $s (@vals) { my $name = $s->get_name(); next if ($name =~ m/^-/ || $name eq ""); my $clsid_path = "Classes\\CLSID\\".$name; my $clsid; if ($clsid = $root_key->get_subkey($clsid_path)) { my $class; my $mod; my $lastwrite; eval { $class = $clsid->get_value("")->get_data(); $bhos{$name}{class} = $class; }; if ($@) { ::logMsg("\tError getting Class name for CLSID\\".$name); ::logMsg("\t".$@); } eval { $mod = $clsid->get_subkey("InProcServer32")->get_value("")->get_data(); $bhos{$name}{module} = $mod; }; if ($@) { ::logMsg("\tError getting Module name for CLSID\\".$name); ::logMsg("\t".$@); } eval{ $lastwrite = $clsid->get_subkey("InProcServer32")->get_timestamp(); $bhos{$name}{lastwrite} = $lastwrite; }; if ($@) { ::logMsg("\tError getting LastWrite time for CLSID\\".$name); ::logMsg("\t".$@); } foreach my $b (keys %bhos) { ::rptMsg($b); ::rptMsg("\tClass => ".$bhos{$b}{class}); ::rptMsg("\tModule => ".$bhos{$b}{module}); ::rptMsg("\tLastWrite => ".gmtime($bhos{$b}{lastwrite})); ::rptMsg(""); } } else { ::rptMsg($clsid_path." not found."); ::rptMsg(""); ::logMsg($clsid_path." not found."); } } } else { ::rptMsg($key_path." has no values. No ShellExecuteHooks installed."); } } else { ::rptMsg($key_path." not found."); } } 1;