Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes. Dynamic-link libraries (DLLs) that are specified in the <code>AppInit_DLLs</code> value in the Registry keys <code>HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows</code> or <code>HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Windows</code> are loaded by user32.dll into every process that loads user32.dll. In practice this is nearly every program, since user32.dll is a very common library. (Citation: Elastic Process Injection July 2017)
Similar to Process Injection, these values can be abused to obtain elevated privileges by causing a malicious DLL to be loaded and run in the context of separate processes on the computer. (Citation: AppInit Registry) Malicious AppInit DLLs may also provide persistence by continuously being triggered by API activity.
The AppInit DLL functionality is disabled in Windows 8 and later versions when secure boot is enabled. (Citation: AppInit Secure Boot)
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name |
---|---|---|---|---|
CM-2 | Baseline Configuration | Protects | T1546.010 | AppInit DLLs |
CM-7 | Least Functionality | Protects | T1546.010 | AppInit DLLs |
SI-10 | Information Input Validation | Protects | T1546.010 | AppInit DLLs |
SI-2 | Flaw Remediation | Protects | T1546.010 | AppInit DLLs |
SI-7 | Software, Firmware, and Information Integrity | Protects | T1546.010 | AppInit DLLs |
attribute.integrity.variety.Alter behavior | Influence or alter human behavior | related-to | T1546.010 | Event Triggered Execution: AppInit DLLs |