runonce.exe

  • File Path: C:\windows\SysWOW64\runonce.exe
  • Description: Run Once Wrapper

Hashes

Type Hash
MD5 2F0FF942FC55D9719D5126C3BD5D6FC2
SHA1 9F67686B5643D7770E4A2D0397F24ECD0273B65C
SHA256 D4F991ADFDD1949AE08A106DAD8A7899FEF0BF5E691AC74099137FC5FFD9386F
SHA384 B201E9575CE1CA3621030DA54CE6AFD787732C33233D9903CE01325DAFB5926BAAAE1B5F16B014BBD38EF3E7E02EE08A
SHA512 18D0217364404F52C332C2EDFBD6C223ECD295233875789BADC55504FAAE075BD817262EF7ED9544380465873DE605300A17C1E9242B6773BC6C23E1DBDD9C62
SSDEEP 768:CTNjNbowJJEaJXAiCn7BfQ8JzixtEJ/RajQ12YBO:ANjNMqDCnMxtEH12k

Signature

  • Status: The file C:\windows\SysWOW64\runonce.exe is not digitally signed. You cannot run this script on the current system. For more information about running scripts and setting execution policy, see about_Execution_Policies at http://go.microsoft.com/fwlink/?LinkID=135170
  • Serial: ``
  • Thumbprint: ``
  • Issuer:
  • Subject:

File Metadata

  • Original Filename: RUNONCE.EXE.MUI
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 6.3.9600.16384 (winblue_rtm.130821-1623)
  • Product Version: 6.3.9600.16384
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.

Possible Misuse

The following table contains possible examples of runonce.exe being misused. While runonce.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
sigma sysmon_suspicious_remote_thread.yml - '\runonce.exe' DRL 1.0
sigma proc_creation_win_cobaltstrike_process_patterns.yml ParentImage\|endswith: '\runonce.exe' DRL 1.0
sigma proc_creation_win_cobaltstrike_process_patterns.yml ParentCommandLine\|endswith: '\runonce.exe' DRL 1.0
sigma proc_creation_win_susp_rundll32_setupapi_installhinfsection.yml description: setupapi.dll library provide InstallHinfSection function for processing INF files. INF file may contain instructions allowing to create values in the registry, modify files and install drivers. This technique could be used to obtain persistence via modifying one of Run or RunOnce registry keys, run process or use other DLLs chain calls (see references) InstallHinfSection function in setupapi.dll calls runonce.exe executable regardless of actual content of INF file. DRL 1.0
sigma proc_creation_win_susp_rundll32_setupapi_installhinfsection.yml Image\|endswith: '\runonce.exe' DRL 1.0
sigma proc_creation_win_susp_runonce_execution.yml - '\runonce.exe' DRL 1.0
sigma registry_event_runonce_persistence.yml description: Rule to detect the configuration of Run Once registry key. Configured payload can be run by runonce.exe /AlternateShellStartup DRL 1.0
LOLBAS Runonce.yml Name: Runonce.exe  
LOLBAS Runonce.yml - Command: Runonce.exe /AlternateShellStartup  
LOLBAS Runonce.yml - Path: C:\Windows\System32\runonce.exe  
LOLBAS Runonce.yml - Path: C:\Windows\SysWOW64\runonce.exe  

MIT License. Copyright (c) 2020-2021 Strontic.