prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Modify Registry | Crimson can set a Registry key to determine how long it has been installed and possibly to indicate the version number. |
Modify Registry | CSPY Downloader can write to the Registry under the %windir% variable to execute tasks. |
Modify Registry | DarkComet adds a Registry value for its installation routine to the Registry Key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System Enable LUA="0" and HKEY_CURRENT_USER\Software\DC3_FEXEC. |
Modify Registry | DarkTortilla has modified registry keys for persistence. |
Modify Registry | DarkWatchman can modify Registry values to store configuration strings, keylogger, and output of components. |
Modify Registry | DCSrv has created Registry keys for persistence. |
Modify Registry | It has modified the Registry to perform multiple techniques through the use of Reg. |
Modify Registry | It modified the registry using the command reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_SZ /d "[file path]" for persistence. |
Modify Registry | It has used an open source batch script to modify Windows Defender registry keys. |
Modify Registry | EVILNUM can make modifications to the Regsitry for persistence. |
Modify Registry | Exaramel for Windows adds the configuration to the Registry in XML format. |
Modify Registry | Explosive has a function to write itself to Registry values. |
Modify Registry | FELIXROOT deletes the Registry key HKCU\Software\Classes\Applications\rundll32.exe\shell\open. |
Modify Registry | Ferocious has the ability to add a Class ID in the current user Registry hive to enable persistence mechanisms. |
Modify Registry | It has deleted Registry keys during post compromise cleanup activities. |
Modify Registry | It has removed security settings for VBA macro execution by changing registry values HKCU\Software\Microsoft\Office\<version>\<product>\Security\VBAWarnings and HKCU\Software\Microsoft\Office\<version>\<product>\Security\AccessVBOM. |
Modify Registry | Gelsemium can modify the Registry to store its components. |
Modify Registry | gh0st RAT has altered the InstallTime subkey. |
Modify Registry | It malware can deactivate security mechanisms in Microsoft Office by editing several keys and values under HKCU\Software\Microsoft\Office\. |
Modify Registry | Grandoreiro can modify the Registry to store its configuration at HKCU\Software\ under frequently changing names including %USERNAME% and ToolTech-RM. |
Modify Registry | GreyEnergy modifies conditions in the Registry and adds keys. |
Modify Registry | HermeticWiper has the ability to modify Registry keys to disable crash dumps, colors for compressed files, and pop-up information about folders and desktop items. |
Modify Registry | HOPLIGHT has modified Managed Object Format (MOF) files within the Registry to run specific commands and create persistence on the system. |
Modify Registry | Hydraq creates a Registry subkey to register its created service, and can also uninstall itself later by deleting this value. Hydraq's backdoor also enables remote attackers to modify and delete subkeys. |
Modify Registry | HyperStack can add the name of its communication pipe to HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters\NullSessionPipes. |
Modify Registry | InvisiMole has a command to create, set, copy, or delete a specified Registry key or value. |
Modify Registry | KEYMARBLE has a command to create Registry entries for storing data under HKEY_CURRENT_USER\SOFTWARE\Microsoft\WABE\DataPath. |
Modify Registry | It has modified Registry settings for default file associations to enable all macros and for persistence. |
Modify Registry | KOCTOPUS has added and deleted keys from the Registry. |
Modify Registry | KONNI has modified registry keys of ComSysApp, Svchost, and xmlProv on the machine to gain persistence. |
Modify Registry | LoJax has modified the Registry key ‘HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\BootExecute’ from ‘autocheck autochk ’ to ‘autocheck autoche ’. |
Modify Registry | Lokibot has modified the Registry as part of its UAC bypass process. |
Modify Registry | It has used malware that adds Registry keys for persistence. |
Modify Registry | Mafalda can manipulate the system registry on a compromised host. |
Modify Registry | It has modified Registry settings for security tools. |
Modify Registry | MegaCortex has added entries to the Registry for ransom contact information. |
Modify Registry | metaMain can write the process ID of a target process into the HKEY_LOCAL_MACHINE\SOFTWARE\DDE\tpid Registry value as part of its reflective loading activity. |
Modify Registry | Metamorfo has written process names to the Registry, disabled IE browser features, deleted Registry keys, and changed the ExtendedUIHoverTime key. |
Modify Registry | Mori can write data to HKLM\Software\NFC\IPA and HKLM\Software\NFC\ and delete Registry values. |
Modify Registry | Mosquito can modify Registry keys under HKCU\Software\Microsoft[dllname] to store configuration values. Mosquito also modifies Registry keys under HKCR\CLSID...\InprocServer32 with a path to the launcher. |
Modify Registry | Naid creates Registry entries that store information about a created service and point to a malicious DLL dropped to disk. |
Modify Registry | NanoCore has the capability to edit the Registry. |
Modify Registry | Neoichor has the ability to configure browser settings by modifying Registry entries under HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer. |
Modify Registry | Nerex creates a Registry subkey that registers a new service. |
Modify Registry | Netwalker can add the following registry entry: HKEY_CURRENT_USER\SOFTWARE{8 random characters}. |
Modify Registry | NETWIRE can modify the Registry to store its configuration information. |
Modify Registry | During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and manipulate the Registry. |
Modify Registry | NightClub can modify the Registry to set the ServiceDLL for a service created by the malware for persistence. |
Modify Registry | njRAT can create, delete, or modify a specified Registry key or value. |
Modify Registry | During Operation Honeybee, the threat actors used batch files that modified registry keys. |
Modify Registry | During Operation Wocao, the threat actors enabled Wdigest by changing the HKLM\SYSTEM\\ControlSet001\\Control\\SecurityProviders\\WDigest registry value from 0 (disabled) to 1 (enabled). |
Modify Registry | Orz can perform Registry operations. |
Modify Registry | Pandora can write an encrypted token to the Registry to enable processing of remote commands. |
Modify Registry | A It payload deletes Resiliency Registry keys created by Microsoft Office applications in an apparent effort to trick users into thinking there were no issues during application runs. |
Modify Registry | PcShare can delete its persistence mechanisms from the registry. |
Modify Registry | PHOREAL is capable of manipulating the Registry. |
Modify Registry | Pillowmint has modified the Registry key HKLM\SOFTWARE\Microsoft\DRM to store a malicious payload. |
Modify Registry | PipeMon has modified the Registry to store its encrypted payload. |
Modify Registry | PLAINTEE uses reg add to add a Registry Run key for persistence. |
Modify Registry | PlugX has a module to create, delete, or modify Registry keys. |
Modify Registry | PoetRAT has made registry modifications to alter its behavior upon execution. |
Modify Registry | PoisonIvy creates a Registry subkey that registers a new system device. |
Modify Registry | PolyglotDuke can write encrypted JSON configuration files to the Registry. |
Modify Registry | PowerShower has added a registry key so future powershell.exe instances are spawned off-screen by default, and has removed all registry entries that are left behind during the dropper process. |
Modify Registry | Prestige has the ability to register new registry keys for a new extension handler via HKCR\.enc and HKCR\enc\shell\open\command. |
Modify Registry | Pysa has modified the registry key "SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" and added the ransom note. |
Modify Registry | QakBot can modify the Registry to store its configuration information in a randomly named subkey under HKCU\Software\Microsoft. |
Modify Registry | QUADAGENT modifies an HKCU Registry key to store a session identifier unique to the compromised system as well as a pre-shared key used for encrypting and decrypting C2 communications. |
Modify Registry | QuasarRAT has a command to edit the Registry on the victim’s machine. |
Modify Registry | RCSession can write its configuration file to the Registry. |
Modify Registry | Reg may be used to interact with and modify the Windows Registry of a local or remote system at the command-line interface. |
Modify Registry | RegDuke can create seemingly legitimate Registry key to store its encryption key. |
Modify Registry | Regin appears to have functionality to modify remote Registry information. |
Modify Registry | Remcos has full control of the Registry, including the ability to modify it. |
Modify Registry | REvil can modify the Registry to save encryption parameters and system information. |
Modify Registry | ROKRAT can modify the HKEY_CURRENT_USER\Software\Microsoft\Office\ registry key so it can bypass the VB object model (VBOM) on a compromised host. |
Modify Registry | Rover has functionality to remove Registry Run key persistence as a cleanup procedure. |
Modify Registry | It can delete all Registry entries created during its execution. |
Modify Registry | ShadowPad can modify the Registry to store and maintain a configuration block and virtual file system. |
Modify Registry | Once Shamoon has access to a network share, it enables the RemoteRegistry service on the target system. It will then connect to the system with RegConnectRegistryW and modify the Registry to disable UAC remote restrictions by setting SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy to 1. |
Modify Registry | ShimRat has registered two registry keys for shim databases. |
Modify Registry | Sibot has modified the Registry to install a second-stage script in the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\sibot. |
Modify Registry | It can create, delete, or modify a specified Registry key or value. |
Modify Registry | SILENTTRINITY can modify registry keys, including to enable or disable Remote Desktop Protocol (RDP). |
Modify Registry | SLOTHFULMEDIA can add, modify, and/or delete registry keys. It has changed the proxy configuration of a victim system by modifying the HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap registry. |
Modify Registry | SMOKEDHAM has modified registry keys for persistence, to enable credential caching for credential access, and to facilitate lateral movement via RDP. |
Modify Registry | SOUNDBITE is capable of modifying the Registry. |
Modify Registry | StreamEx has the ability to modify the Registry. |
Modify Registry | Stuxnet can create registry keys to load driver files. |
Modify Registry | SUNBURST had commands that allow an attacker to write or delete registry keys, and was observed stopping services by setting their HKLM\SYSTEM\CurrentControlSet\services\[service_name]\Start registry entries to value 4. It also deleted previously-created Image File Execution Options (IFEO) Debugger registry values and registry keys related to HTTP proxy to clean up traces of its activity. |
Modify Registry | SynAck can manipulate Registry keys. |
Modify Registry | SysUpdate can write its configuration file to Software\Classes\scConfig in either HKEY_LOCAL_MACHINE or HKEY_CURRENT_USER. |
Modify Registry | It has used malware to disable Windows Defender through modification of the Registry. |
Modify Registry | Taidoor has the ability to modify the Registry on compromised hosts using RegDeleteValueA and RegCreateKeyExA. |
Modify Registry | TajMahal can set the KeepPrintedJobs attribute for configured printers in SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers to enable document stealing. |
Modify Registry | Tarrask is able to delete the Security Descriptor (SD) registry subkey in order to "hide" scheduled tasks. |
Modify Registry | TEARDROP modified the Registry to create a Windows service for itself on a compromised host. |
Modify Registry | A It tool has created new Registry keys under HKEY_CURRENT_USER\Software\Classes\ and HKLM\SYSTEM\CurrentControlSet\services. |
Modify Registry | ThreatNeedle can modify the Registry to save its configuration data as the following RC4-encrypted Registry key: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\GameCon. |
Modify Registry | TinyIt can set its configuration parameters in the Registry. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.