text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Attor's dispatcher can modify the Run registry key.
['T1112']
BACKSPACE is capable of deleting Registry keys, sub-keys, and values on a victim system.
['T1112']
BADCALL modifies the firewall Registry key "SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfileGloballyOpenPorts\\List".
['T1112']
Bankshot writes data into the Registry key "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Pniumj".
['T1112']
BitPaymer can set values in the Registry to help in execution.
['T1112']
Blue Mockingbird has used Windows Registry modifications to specify a DLL payload.
['T1112']
CSPY Downloader can write to the Registry under the "%windir%" variable to execute tasks.
['T1112']
Cardinal RAT sets "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load" to point to its executable.
['T1112']
Caterpillar WebShell has a command to modify a Registry key.
['T1112']
CharmPower can remove persistence-related artifacts from the Registry.
['T1112']
Clambling can set and delete Registry keys.
['T1112']
Clop can make modifications to Registry keys.
['T1112']
ComRAT has encrypted and stored its orchestrator code in the Registry as well as a PowerShell script into the WsqmCons Registry key.
['T1112']
Conficker adds keys to the Registry at "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services" and various other Registry locations.
['T1112']
CrackMapExec can create a registry key using wdigest.
['T1112']
Crimson can set a Registry key to determine how long it has been installed and possibly to indicate the version number.
['T1112']
DCSrv has created Registry keys for persistence.
['T1112']
During Operation Honeybee, the threat actors used batch files that modified registry keys.
['T1112']
EVILNUM can make modifications to the Regsitry for persistence.
['T1112']
Earth Lusca modified the registry using the command "reg add “HKEY_CURRENT_USER\Environment” /v UserInitMprLogonScript /t REG_SZ /d “[file path]”" for persistence.
['T1112']
Ember Bear has used an open source batch script to modify Windows Defender registry keys.
['T1112']
Exaramel for Windows adds the configuration to the Registry in XML format.
['T1112']
Explosive has a function to write itself to Registry values.
['T1112']
FELIXROOT deletes the Registry key "HKCU\Software\Classes\Applications\rundll32.exe\shell\open".
['T1112']
Ferocious has the ability to add a Class ID in the current user Registry hive to enable persistence mechanisms.
['T1112']
Gelsemium has the ability to store its components in the Registry.
['T1112']
Gorgon Group malware can deactivate security mechanisms in Microsoft Office by editing several keys and values under "HKCU\Software\Microsoft\Office\".
['T1112']
Grandoreiro can store its configuration in the Registry at "HKCU\Software\" under frequently changing names including "%USERNAME%" and "ToolTech-RM".
['T1112']
GreyEnergy modifies conditions in the Registry and adds keys.
['T1112']
HOPLIGHT has modified Managed Object Format (MOF) files within the Registry to run specific commands and create persistence on the system.
['T1112']
HermeticWiper has the ability to modify Registry keys to disable crash dumps, colors for compressed files, and pop-up information about folders and desktop items.
['T1112']
Honeybee uses a batch file that modifies Registry keys to launch a DLL into the svchost.exe process.
['T1112']
Hydraq creates a Registry subkey to register its created service, and can also uninstall itself later by deleting this value. Hydraq's backdoor also enables remote attackers to modify and delete subkeys.
['T1112']
HyperStack can add the name of its communication pipe to "HKLM\SYSTEM\\CurrentControlSet\\Services\\lanmanserver\\parameters\NullSessionPipes".
['T1112']
InvisiMole has a command to create, set, copy, or delete a specified Registry key or value.
['T1112']
KEYMARBLE has a command to create Registry entries for storing data under "HKEY_CURRENT_USER\SOFTWARE\Microsoft\WABE\DataPath".
['T1112']
KONNI has modified registry keys of ComSysApp, Svchost, and xmlProv on the machine to gain persistence.
['T1112']
Kimsuky has modified Registry settings for default file associations to enable all macros and for persistence.
['T1112']
LoJax has modified the Registry key "‘HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\BootExecute’" from "‘autocheck autochk *’" to "‘autocheck autoche *’".
['T1112']
Magic Hound has modified Registry settings for security tools.
['T1112']
MegaCortex has added entries to the Registry for ransom contact information.
['T1112']
Metamorfo has written process names to the Registry, disabled IE browser features, deleted Registry keys, and changed the ExtendedUIHoverTime key.
['T1112']
Mosquito stores configuration values under the Registry key "HKCU\Software\Microsoft\[dllname]" and modifies Registry keys under "HKCR\CLSID\...\InprocServer32"with a path to the launcher.
['T1112']
NETWIRE stores its configuration file within the Registry.
['T1112']
NanoCore has the capability to edit the Registry.
['T1112']
Neoichor has the ability to configure browser settings by modifying Registry entries under `HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer`.
['T1112']
Nerex creates a Registry subkey that registers a new service.
['T1112', 'T1543.003']
Once Shamoon has access to a network share, it enables the RemoteRegistry service on the target system. It will then connect to the system with RegConnectRegistryW and modify the Registry to disable UAC remote restrictions by setting "SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy" to 1.
['T1112']
Operation Wocao has enabled Wdigest by changing the registry value from 0 to 1.
['T1112']
Orz can perform Registry operations.
['T1112']
PHOREAL is capable of manipulating the Registry.
['T1112']
PLAINTEE uses "reg add" to add a Registry Run key for persistence.
['T1112']
Pillowmint has stored its malicious payload in the registry key "HKLM\SOFTWARE\Microsoft\DRM".
['T1112']
PipeMon has stored its encrypted payload in the Registry.
['T1112']
PlugX has a module to create, delete, or modify Registry keys.
['T1112']
PoetRAT has made registry modifications to alter its behavior upon execution.
['T1112']
PoisonIvy creates a Registry subkey that registers a new system device.
['T1112']
PolyglotDuke can write encrypted JSON configuration files to the Registry.
['T1112']
PowerShower has added a registry key so future powershell.exe instances are spawned off-screen by default, and has removed all registry entries that are left behind during the dropper process.
['T1112']
QuasarRAT has a command to edit the Registry on the victim’s machine.
['T1112']
REvil can save encryption parameters and system information to the Registry.
['T1112']
ROKRAT can modify the `HKEY_CURRENT_USER\Software\Microsoft\Office\` registry key so it can bypass the VB object model (VBOM) on a compromised host.
['T1112']
Reg may be used to interact with and modify the Windows Registry of a local or remote system at the command-line interface.
['T1112']
RegDuke can store its encryption key in the Registry.
['T1112']
Regin appears to have functionality to modify remote Registry information.
['T1112']
Remcos has full control of the Registry, including the ability to modify it.
['T1112']
Rover has functionality to remove Registry Run key persistence as a cleanup procedure.
['T1112']
SILENTTRINITY can modify registry keys, including to enable or disable Remote Desktop Protocol (RDP).
['T1112']
SMOKEDHAM has modified registry keys for persistence, to enable credential caching for credential access, and to facilitate lateral movement via RDP.
['T1112']
SOUNDBITE is capable of modifying the Registry.
['T1112']
SUNBURST had commands that allow an attacker to write or delete registry keys, and was observed stopping services by setting their "HKLM\SYSTEM\CurrentControlSet\services\\[service_name]\\Start" registry entries to value 4. It also deleted previously-created Image File Execution Options (IFEO) Debugger registry values and registry keys related to HTTP proxy to clean up traces of its activity.
['T1112']
ShimRat has registered two registry keys for shim databases.
['T1112']
Sibot has installed a second-stage script in the "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\sibot" registry key.
['T1112']
Silence can create, delete, or modify a specified Registry key or value.
['T1112']
SynAck can manipulate Registry keys.
['T1112']
SysUpdate can write its configuration file to "Software\Classes\scConfig" in either "HKEY_LOCAL_MACHINE" or "HKEY_CURRENT_USER".
['T1112']
TA505 has used malware to disable Windows Defender through modification of the Registry.
['T1112']
TYPEFRAME can install encrypted configuration data under the Registry key "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellCompatibility\Applications\laxhost.dll" and "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\PrintConfigs".
['T1112']
Taidoor has the ability to modify the Registry on compromised hosts using "RegDeleteValueA" and "RegCreateKeyExA".
['T1112']
TajMahal can set the "KeepPrintedJobs" attribute for configured printers in "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Print\\Printers" to enable document stealing.
['T1112']
Tarrask is able to delete the Security Descriptor (`SD`) registry subkey in order to “hide” scheduled tasks.
['T1112']
ThreatNeedle can save its configuration data as the following RC4-encrypted Registry key: `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\GameCon`.
['T1112']
TinyTurla can set its configuration parameters in the Registry.
['T1112']
TrickBot can modify registry entries.
['T1112']
Turla has used the Registry to store encrypted payloads.
['T1112']
Valak has the ability to modify the Registry key "HKCU\Software\ApplicationContainer\Appsw64" to store information regarding the C2 server and downloads.
['T1112']
Volgmer stores the encoded configuration file in the Registry key "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Security".
['T1112']
WarzoneRAT can create `HKCU\Software\Classes\Folder\shell\open\command` as a new registry key during privilege escalation.
['T1112']
WastedLocker can modify registry values within the "Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap" registry key.
['T1112']
Waterbear has deleted certain values from the Registry to load a malicious DLL.
['T1112']
Wizard Spider has modified the Registry key "HKLM\System\CurrentControlSet\Control\SecurityProviders\WDigest" by setting the "UseLogonCredential" registry value to "1" in order to force credentials to be stored in clear text in memory.
['T1112']
Zeus Panda modifies several Registry keys under "HKCU\Software\Microsoft\Internet Explorer\ PhishingFilter\" to disable phishing filters.
['T1112']
creates a Registry subkey that registers a new system device.
['T1112', 'T1112']
njRAT can create, delete, or modify a specified Registry key or value.
['T1112']
zwShell can modify the Registry.
['T1112']
A JHUHUGIT variant takes screenshots by simulating the user pressing the "Take Screenshot" key (VK_SCREENSHOT), accessing the screenshot saved in the clipboard, and converting it to a JPG image.
['T1113']
A variant of Zebrocy captures screenshots of the victim’s machine in JPEG and BMP format.
['T1113']
APT28 has used tools to take screenshots from victims.
['T1113']
APT34 has a tool called CANDYKING to capture a screenshot of user's desktop.
['T1113']
APT39 has used a screen capture utility to take screenshots on a compromised host.
['T1113']