mirror of
https://github.com/overcuriousity/autopsy-flatpak.git
synced 2025-07-14 17:06:16 +00:00
118 lines
3.4 KiB
Perl
118 lines
3.4 KiB
Perl
#-----------------------------------------------------------
|
|
# shellexec
|
|
# Get ShellExecuteHooks values from Software hive (based on BHO
|
|
# code)
|
|
#
|
|
# ShellExecuteHooks are DLLs that load as part of the Explorer.exe process,
|
|
# and can intercept commands. There are some legitimate applications that
|
|
# run as ShellExecuteHooks, but many times, malware (spy-, ad-ware) will
|
|
# install here. ShellExecuteHooks allow you to type a URL into the Start->Run
|
|
# box and have that URL opened in your browser. For example, in 2001, Michael
|
|
# Dunn wrote KBLaunch, a ShellExecuteHook that looked for "?q" in the Run box
|
|
# and would open the appropriate MS KB article.
|
|
#
|
|
# Refs:
|
|
# http://support.microsoft.com/kb/914922
|
|
# http://support.microsoft.com/kb/170918
|
|
# http://support.microsoft.com/kb/943460
|
|
#
|
|
# History:
|
|
# 20081229 - initial creation
|
|
#
|
|
# copyright 2008 H. Carvey, keydet89@yahoo.com
|
|
#-----------------------------------------------------------
|
|
package shellexec;
|
|
use strict;
|
|
|
|
my %config = (hive => "Software",
|
|
hasShortDescr => 1,
|
|
hasDescr => 0,
|
|
hasRefs => 0,
|
|
osmask => 22,
|
|
version => 20081229);
|
|
|
|
sub getConfig{return %config}
|
|
sub getShortDescr {
|
|
return "Gets ShellExecuteHooks from Software hive";
|
|
}
|
|
sub getDescr{}
|
|
sub getRefs {}
|
|
sub getHive {return $config{hive};}
|
|
sub getVersion {return $config{version};}
|
|
|
|
my $VERSION = getVersion();
|
|
|
|
sub pluginmain {
|
|
my $class = shift;
|
|
my $hive = shift;
|
|
my %bhos;
|
|
::logMsg("Launching shellexec v.".$VERSION);
|
|
my $reg = Parse::Win32Registry->new($hive);
|
|
my $root_key = $reg->get_root_key;
|
|
my $key_path = "Microsoft\\Windows\\CurrentVersion\\Explorer\\ShellExecuteHooks";;
|
|
my $key;
|
|
if ($key = $root_key->get_subkey($key_path)) {
|
|
::rptMsg($key_path);
|
|
::rptMsg("LastWrite Time ".gmtime($key->get_timestamp())." (UTC)");
|
|
::rptMsg("");
|
|
my @vals = $key->get_list_of_values();
|
|
if (scalar (@vals) > 0) {
|
|
foreach my $s (@vals) {
|
|
my $name = $s->get_name();
|
|
next if ($name =~ m/^-/ || $name eq "");
|
|
my $clsid_path = "Classes\\CLSID\\".$name;
|
|
my $clsid;
|
|
if ($clsid = $root_key->get_subkey($clsid_path)) {
|
|
my $class;
|
|
my $mod;
|
|
my $lastwrite;
|
|
|
|
eval {
|
|
$class = $clsid->get_value("")->get_data();
|
|
$bhos{$name}{class} = $class;
|
|
};
|
|
if ($@) {
|
|
::logMsg("\tError getting Class name for CLSID\\".$name);
|
|
::logMsg("\t".$@);
|
|
}
|
|
eval {
|
|
$mod = $clsid->get_subkey("InProcServer32")->get_value("")->get_data();
|
|
$bhos{$name}{module} = $mod;
|
|
};
|
|
if ($@) {
|
|
::logMsg("\tError getting Module name for CLSID\\".$name);
|
|
::logMsg("\t".$@);
|
|
}
|
|
eval{
|
|
$lastwrite = $clsid->get_subkey("InProcServer32")->get_timestamp();
|
|
$bhos{$name}{lastwrite} = $lastwrite;
|
|
};
|
|
if ($@) {
|
|
::logMsg("\tError getting LastWrite time for CLSID\\".$name);
|
|
::logMsg("\t".$@);
|
|
}
|
|
|
|
foreach my $b (keys %bhos) {
|
|
::rptMsg($b);
|
|
::rptMsg("\tClass => ".$bhos{$b}{class});
|
|
::rptMsg("\tModule => ".$bhos{$b}{module});
|
|
::rptMsg("\tLastWrite => ".gmtime($bhos{$b}{lastwrite}));
|
|
::rptMsg("");
|
|
}
|
|
}
|
|
else {
|
|
::rptMsg($clsid_path." not found.");
|
|
::rptMsg("");
|
|
::logMsg($clsid_path." not found.");
|
|
}
|
|
}
|
|
}
|
|
else {
|
|
::rptMsg($key_path." has no values. No ShellExecuteHooks installed.");
|
|
}
|
|
}
|
|
else {
|
|
::rptMsg($key_path." not found.");
|
|
}
|
|
}
|
|
1; |