Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 515

IFEO Injection

What is IFEO Injection?

IFEO InjectionA persistence and privilege-escalation technique that abuses the Windows Image File Execution Options registry key to run attacker code whenever a target executable launches.


IFEO injection (MITRE ATT&CK T1546.012) abuses HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options. Originally meant for debugging, this key lets administrators attach a Debugger value to an executable name: whenever Windows launches that program, it instead launches the debugger with the original binary as argument. Attackers register their payload as the debugger of a commonly used executable (sethc.exe, utilman.exe, taskmgr.exe) to gain persistence, or use the GlobalFlag plus SilentProcessExit subkey to spawn code when a target process exits. The technique requires admin rights but is highly effective and often missed. Defenses: monitor IFEO writes with Sysmon event 13, block by AppLocker, and alert on Debugger values pointing to unsigned binaries.

Examples

  1. 01

    Setting a Debugger value on sethc.exe so pressing Shift five times at the lock screen spawns a SYSTEM shell.

  2. 02

    Configuring SilentProcessExit on lsass.exe to dump credentials when the process exits.

Frequently asked questions

What is IFEO Injection?

A persistence and privilege-escalation technique that abuses the Windows Image File Execution Options registry key to run attacker code whenever a target executable launches. It belongs to the Attacks & Threats category of cybersecurity.

What does IFEO Injection mean?

A persistence and privilege-escalation technique that abuses the Windows Image File Execution Options registry key to run attacker code whenever a target executable launches.

How does IFEO Injection work?

IFEO injection (MITRE ATT&CK T1546.012) abuses HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options. Originally meant for debugging, this key lets administrators attach a Debugger value to an executable name: whenever Windows launches that program, it instead launches the debugger with the original binary as argument. Attackers register their payload as the debugger of a commonly used executable (sethc.exe, utilman.exe, taskmgr.exe) to gain persistence, or use the GlobalFlag plus SilentProcessExit subkey to spawn code when a target process exits. The technique requires admin rights but is highly effective and often missed. Defenses: monitor IFEO writes with Sysmon event 13, block by AppLocker, and alert on Debugger values pointing to unsigned binaries.

How do you defend against IFEO Injection?

Defences for IFEO Injection typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for IFEO Injection?

Common alternative names include: Image File Execution Options abuse, Debugger hijack, SilentProcessExit persistence.

Related terms