Query Autorun locations for any item nested that is not digitally signed

AID2201221238.YAML

#####aid_begin
#description: query autorun locations for any item nested and not digitally signed.
#id: aid2201221238
#processtype: query
#category: Combination
#link: <na>
#tacticidlist: <na>
#techniqueidlist: <na>
#compatibleos: |-
#  windows 7
#  windows 8.*
#  windows 10
#  windows 11
#  windows server 2008 r2
#  windows server 2012
#  windows server 2012 r2
#  windows server 2016
#  windows server 2019
#compatibleengine: |-
#  powershell 2
#  powershell 3
#  powershell 4
#  powershell 5.*
#  powershell 7.*
#bgcommandlist: |-
#  get-bgautoruns
#notes:  |-
#  1) this uses the sysinternal tools autoruns binary. 
#  2) to update/install sysinternal tools on the host run the command (update-bgsysinternals) in the blugenie console
#  3) this utility shows you the currently configured auto-start applications as well as the full list of registry and file system locations available for auto-start configuration. autostart locations displayed by autoruns include logon entries, explorer add-ons, internet explorer add-ons including browser helper objects (bhos), appinit dlls, image hijacks, boot execute images, winlogon notification dlls, windows services and winsock layered service providers, media codecs, and more. switch tabs to view autostarts from different categories.
#####aid_end
commands:
- Get-BGAutoRuns -Signature -HideSigned All

Last updated