Screensavers Hijack
Screensavers are part of Windows functionality and enable users to put a screen message or a graphic animation after a period of inactivity. This feature of Windows it is known to be abused by threat actors as a method of persistence.
This is because screensavers are executable files that have the .scr
file extension and are executed via the scrnsave.scr
utility.
.scr
file extension and are executed via the scrnsave.scr
utility.Screensaver settings are stored in the registry and the values that are considered most valuable from an offensive perspective are:
Registry keys can be modified or added via the command prompt or from a PowerShell console. Since the .scr files are essentially executables both extensions can be used to the file that will act as the implant
Once the period of inactivity is passed the arbitrary payload will executed and a communication will the command and control will established again.
another thing to consider is the timeout when setting the registry key.
The issue with the persistence technique that utilize screensavers is that the session will drop when the user returns back and the system is not in idle mode. However red teams can perform their operations during the absence of the user. If screensavers are disabled by group policy this technique cannot be used for persistence.
Last updated