Screensavers Hijack
Screensavers are part of Windows functionality and enable users to put a screen message or a graphic animation after a period of inactivity. This feature of Windows it is known to be abused by threat actors as a method of persistence.
This is because screensavers are executable files that have the .scr
file extension and are executed via the scrnsave.scr
utility.
.scr
file extension and are executed via the scrnsave.scr
utility.This will not work in systems that don't have screensaver activated or in AD environments where the screensaver is manager by domain group policies.
Screensaver settings are stored in the registry and the values that are considered most valuable from an offensive perspective are:
Registry keys can be modified or added via the command prompt or from a PowerShell console. Since the .scr files are essentially executables both extensions can be used to the file that will act as the implant
Once the period of inactivity is passed the arbitrary payload will executed and a communication will the command and control will established again.
another thing to consider is the timeout when setting the registry key.
Last updated