prompt
stringclasses
508 values
procedure
stringlengths
20
478
Modify Registry
Crimson can set a Registry key to determine how long it has been installed and possibly to indicate the version number.
Modify Registry
CSPY Downloader can write to the Registry under the %windir% variable to execute tasks.
Modify Registry
DarkComet adds a Registry value for its installation routine to the Registry Key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System Enable LUA="0" and HKEY_CURRENT_USER\Software\DC3_FEXEC.
Modify Registry
DarkTortilla has modified registry keys for persistence.
Modify Registry
DarkWatchman can modify Registry values to store configuration strings, keylogger, and output of components.
Modify Registry
DCSrv has created Registry keys for persistence.
Modify Registry
It has modified the Registry to perform multiple techniques through the use of Reg.
Modify Registry
It modified the registry using the command reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_SZ /d "[file path]" for persistence.
Modify Registry
It has used an open source batch script to modify Windows Defender registry keys.
Modify Registry
EVILNUM can make modifications to the Regsitry for persistence.
Modify Registry
Exaramel for Windows adds the configuration to the Registry in XML format.
Modify Registry
Explosive has a function to write itself to Registry values.
Modify Registry
FELIXROOT deletes the Registry key HKCU\Software\Classes\Applications\rundll32.exe\shell\open.
Modify Registry
Ferocious has the ability to add a Class ID in the current user Registry hive to enable persistence mechanisms.
Modify Registry
It has deleted Registry keys during post compromise cleanup activities.
Modify Registry
It has removed security settings for VBA macro execution by changing registry values HKCU\Software\Microsoft\Office\<version>\<product>\Security\VBAWarnings and HKCU\Software\Microsoft\Office\<version>\<product>\Security\AccessVBOM.
Modify Registry
Gelsemium can modify the Registry to store its components.
Modify Registry
gh0st RAT has altered the InstallTime subkey.
Modify Registry
It malware can deactivate security mechanisms in Microsoft Office by editing several keys and values under HKCU\Software\Microsoft\Office\.
Modify Registry
Grandoreiro can modify the Registry to store its configuration at HKCU\Software\ under frequently changing names including %USERNAME% and ToolTech-RM.
Modify Registry
GreyEnergy modifies conditions in the Registry and adds keys.
Modify Registry
HermeticWiper has the ability to modify Registry keys to disable crash dumps, colors for compressed files, and pop-up information about folders and desktop items.
Modify Registry
HOPLIGHT has modified Managed Object Format (MOF) files within the Registry to run specific commands and create persistence on the system.
Modify Registry
Hydraq creates a Registry subkey to register its created service, and can also uninstall itself later by deleting this value. Hydraq's backdoor also enables remote attackers to modify and delete subkeys.
Modify Registry
HyperStack can add the name of its communication pipe to HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters\NullSessionPipes.
Modify Registry
InvisiMole has a command to create, set, copy, or delete a specified Registry key or value.
Modify Registry
KEYMARBLE has a command to create Registry entries for storing data under HKEY_CURRENT_USER\SOFTWARE\Microsoft\WABE\DataPath.
Modify Registry
It has modified Registry settings for default file associations to enable all macros and for persistence.
Modify Registry
KOCTOPUS has added and deleted keys from the Registry.
Modify Registry
KONNI has modified registry keys of ComSysApp, Svchost, and xmlProv on the machine to gain persistence.
Modify Registry
LoJax has modified the Registry key ‘HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\BootExecute’ from ‘autocheck autochk ’ to ‘autocheck autoche ’.
Modify Registry
Lokibot has modified the Registry as part of its UAC bypass process.
Modify Registry
It has used malware that adds Registry keys for persistence.
Modify Registry
Mafalda can manipulate the system registry on a compromised host.
Modify Registry
It has modified Registry settings for security tools.
Modify Registry
MegaCortex has added entries to the Registry for ransom contact information.
Modify Registry
metaMain can write the process ID of a target process into the HKEY_LOCAL_MACHINE\SOFTWARE\DDE\tpid Registry value as part of its reflective loading activity.
Modify Registry
Metamorfo has written process names to the Registry, disabled IE browser features, deleted Registry keys, and changed the ExtendedUIHoverTime key.
Modify Registry
Mori can write data to HKLM\Software\NFC\IPA and HKLM\Software\NFC\ and delete Registry values.
Modify Registry
Mosquito can modify Registry keys under HKCU\Software\Microsoft[dllname] to store configuration values. Mosquito also modifies Registry keys under HKCR\CLSID...\InprocServer32 with a path to the launcher.
Modify Registry
Naid creates Registry entries that store information about a created service and point to a malicious DLL dropped to disk.
Modify Registry
NanoCore has the capability to edit the Registry.
Modify Registry
Neoichor has the ability to configure browser settings by modifying Registry entries under HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer.
Modify Registry
Nerex creates a Registry subkey that registers a new service.
Modify Registry
Netwalker can add the following registry entry: HKEY_CURRENT_USER\SOFTWARE{8 random characters}.
Modify Registry
NETWIRE can modify the Registry to store its configuration information.
Modify Registry
During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and manipulate the Registry.
Modify Registry
NightClub can modify the Registry to set the ServiceDLL for a service created by the malware for persistence.
Modify Registry
njRAT can create, delete, or modify a specified Registry key or value.
Modify Registry
During Operation Honeybee, the threat actors used batch files that modified registry keys.
Modify Registry
During Operation Wocao, the threat actors enabled Wdigest by changing the HKLM\SYSTEM\\ControlSet001\\Control\\SecurityProviders\\WDigest registry value from 0 (disabled) to 1 (enabled).
Modify Registry
Orz can perform Registry operations.
Modify Registry
Pandora can write an encrypted token to the Registry to enable processing of remote commands.
Modify Registry
A It payload deletes Resiliency Registry keys created by Microsoft Office applications in an apparent effort to trick users into thinking there were no issues during application runs.
Modify Registry
PcShare can delete its persistence mechanisms from the registry.
Modify Registry
PHOREAL is capable of manipulating the Registry.
Modify Registry
Pillowmint has modified the Registry key HKLM\SOFTWARE\Microsoft\DRM to store a malicious payload.
Modify Registry
PipeMon has modified the Registry to store its encrypted payload.
Modify Registry
PLAINTEE uses reg add to add a Registry Run key for persistence.
Modify Registry
PlugX has a module to create, delete, or modify Registry keys.
Modify Registry
PoetRAT has made registry modifications to alter its behavior upon execution.
Modify Registry
PoisonIvy creates a Registry subkey that registers a new system device.
Modify Registry
PolyglotDuke can write encrypted JSON configuration files to the Registry.
Modify Registry
PowerShower has added a registry key so future powershell.exe instances are spawned off-screen by default, and has removed all registry entries that are left behind during the dropper process.
Modify Registry
Prestige has the ability to register new registry keys for a new extension handler via HKCR\.enc and HKCR\enc\shell\open\command.
Modify Registry
Pysa has modified the registry key "SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" and added the ransom note.
Modify Registry
QakBot can modify the Registry to store its configuration information in a randomly named subkey under HKCU\Software\Microsoft.
Modify Registry
QUADAGENT modifies an HKCU Registry key to store a session identifier unique to the compromised system as well as a pre-shared key used for encrypting and decrypting C2 communications.
Modify Registry
QuasarRAT has a command to edit the Registry on the victim’s machine.
Modify Registry
RCSession can write its configuration file to the Registry.
Modify Registry
Reg may be used to interact with and modify the Windows Registry of a local or remote system at the command-line interface.
Modify Registry
RegDuke can create seemingly legitimate Registry key to store its encryption key.
Modify Registry
Regin appears to have functionality to modify remote Registry information.
Modify Registry
Remcos has full control of the Registry, including the ability to modify it.
Modify Registry
REvil can modify the Registry to save encryption parameters and system information.
Modify Registry
ROKRAT can modify the HKEY_CURRENT_USER\Software\Microsoft\Office\ registry key so it can bypass the VB object model (VBOM) on a compromised host.
Modify Registry
Rover has functionality to remove Registry Run key persistence as a cleanup procedure.
Modify Registry
It can delete all Registry entries created during its execution.
Modify Registry
ShadowPad can modify the Registry to store and maintain a configuration block and virtual file system.
Modify Registry
Once Shamoon has access to a network share, it enables the RemoteRegistry service on the target system. It will then connect to the system with RegConnectRegistryW and modify the Registry to disable UAC remote restrictions by setting SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy to 1.
Modify Registry
ShimRat has registered two registry keys for shim databases.
Modify Registry
Sibot has modified the Registry to install a second-stage script in the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\sibot.
Modify Registry
It can create, delete, or modify a specified Registry key or value.
Modify Registry
SILENTTRINITY can modify registry keys, including to enable or disable Remote Desktop Protocol (RDP).
Modify Registry
SLOTHFULMEDIA can add, modify, and/or delete registry keys. It has changed the proxy configuration of a victim system by modifying the HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap registry.
Modify Registry
SMOKEDHAM has modified registry keys for persistence, to enable credential caching for credential access, and to facilitate lateral movement via RDP.
Modify Registry
SOUNDBITE is capable of modifying the Registry.
Modify Registry
StreamEx has the ability to modify the Registry.
Modify Registry
Stuxnet can create registry keys to load driver files.
Modify Registry
SUNBURST had commands that allow an attacker to write or delete registry keys, and was observed stopping services by setting their HKLM\SYSTEM\CurrentControlSet\services\[service_name]\Start registry entries to value 4. It also deleted previously-created Image File Execution Options (IFEO) Debugger registry values and registry keys related to HTTP proxy to clean up traces of its activity.
Modify Registry
SynAck can manipulate Registry keys.
Modify Registry
SysUpdate can write its configuration file to Software\Classes\scConfig in either HKEY_LOCAL_MACHINE or HKEY_CURRENT_USER.
Modify Registry
It has used malware to disable Windows Defender through modification of the Registry.
Modify Registry
Taidoor has the ability to modify the Registry on compromised hosts using RegDeleteValueA and RegCreateKeyExA.
Modify Registry
TajMahal can set the KeepPrintedJobs attribute for configured printers in SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers to enable document stealing.
Modify Registry
Tarrask is able to delete the Security Descriptor (SD) registry subkey in order to "hide" scheduled tasks.
Modify Registry
TEARDROP modified the Registry to create a Windows service for itself on a compromised host.
Modify Registry
A It tool has created new Registry keys under HKEY_CURRENT_USER\Software\Classes\ and HKLM\SYSTEM\CurrentControlSet\services.
Modify Registry
ThreatNeedle can modify the Registry to save its configuration data as the following RC4-encrypted Registry key: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\GameCon.
Modify Registry
TinyIt can set its configuration parameters in the Registry.