text1
stringlengths
7
2.5k
labels
stringlengths
9
100
BoomBox can establish persistence by writing the Registry value "MicroNativeCacheSvc" to "HKCU\Software\Microsoft\Windows\CurrentVersion\Run".
['T1547.001']
Briba creates run key Registry entries pointing to malicious DLLs dropped to disk.
['T1547.001']
Cardinal RAT establishes Persistence by setting the "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load" Registry key to point to its executable.
['T1547.001']
ChChes establishes persistence by adding a Registry Run key.
['T1547.001']
Chaes has added persistence via the Registry key "software\microsoft\windows\currentversion\run\microsoft windows html help".
['T1547.001']
Clambling can establish persistence by adding a Registry run key.
['T1547.001']
Cobalt Group has used Registry Run keys for persistence. The group has also set a Startup path to launch the PowerShell shell command and download Cobalt Strike.
['T1547.001']
Cobian RAT creates an autostart Registry key to ensure persistence.
['T1547.001']
Conficker adds Registry Run keys to establish persistence.
['T1547.001']
Confucius has dropped malicious files into the startup folder `%AppData%\Microsoft\Windows\Start Menu\Programs\Startup` on a compromised host in order to maintain persistence.
['T1547.001']
Crimson can add Registry run keys for persistence.
['T1547.001']
CrossRAT uses run keys for persistence on Windows
['T1547.001']
Dark Caracal's version of Bandook adds a registry key to "HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run" for persistence.
['T1547.001']
Darkhotel has been known to establish persistence by adding programs to the Run Registry key.
['T1547.001']
DnsSystem can write itself to the Startup folder to gain persistence.
['T1547.001']
Dragonfly has added the registry value ntdll to the Registry Run key to establish persistence.
['T1547.001']
During Operation Sharpshooter, a first-stage downloader installed Rising Sun to `%Startup%\mssync.exe` on a compromised host.
['T1547.001']
DustySky achieves persistence by creating a Registry entry in "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run".
['T1547.001']
EVILNUM can achieve persistence through the Registry Run key.
['T1547.001']
Emotet has been observed adding the downloaded payload to the "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" key to maintain persistence.
['T1547.001']
EvilBunny has created Registry keys for persistence in "[HKLM|HKCU]\…\CurrentVersion\Run".
['T1547.001']
EvilGrab adds a Registry Run key for ctfmon.exe to establish persistence.
['T1547.001']
FELIXROOT adds a shortcut file to the startup folder for persistence.
['T1547.001']
FIN10 has established persistence by using the Registry option in PowerShell Empire to add a Run key.
['T1547.001']
FIN6 has used Registry Run keys to establish persistence for its downloader tools known as HARDTACK and SHIPBREAD.
['T1547.001']
FLASHFLOOD achieves persistence by making an entry in the Registry's Run key.
['T1547.001']
FatDuke has used "HKLM\SOFTWARE\Microsoft\CurrentVersion\Run" to establish persistence.
['T1547.001']
FinFisher establishes persistence by creating the Registry key "HKCU\Software\Microsoft\Windows\Run".
['T1547.001']
Final1stspy creates a Registry Run key to establish persistence.
['T1547.001']
FunnyDream can use a Registry Run Key and the Startup folder to establish persistence.
['T1547.001']
GRIFFON has used a persistence module that stores the implant inside the Registry, which executes at logon.
['T1547.001']
Gamaredon Group tools have registered Run keys in the registry to give malicious VBS files persistence.
['T1547.001']
Gazer can establish persistence by creating a .lnk file in the Start menu.
['T1547.001']
Gelsemium can set persistence with a Registry run key.
['T1547.001']
Gold Dragon establishes persistence in the Startup folder.
['T1547.001']
Grandoreiro can use run keys and create link files in the startup folder for persistence.
['T1547.001']
GrimAgent can set persistence with a Registry run key.
['T1547.001']
HTTPBrowser has established persistence by setting the "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" key value for "wdm" to the path of the executable. It has also used the Registry entry "HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run vpdn “%ALLUSERPROFILE%\%APPDATA%\vpdn\VPDN_LU.exe”" to establish persistence.
['T1547.001']
Heyoka Backdoor can establish persistence with the auto start function including using the value `EverNoteTrayUService`.
['T1547.001']
Hi-Zor creates a Registry Run key to establish persistence.
['T1547.001']
Honeybee uses a batch file that configures the ComSysApp service to autostart in order to establish persistence.
['T1547.001']
Inception has maintained persistence by modifying Registry run key value "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\".
['T1547.001']
JCry has created payloads in the Startup directory to maintain persistence.
['T1547.001']
JHUHUGIT has used a Registry Run key to establish persistence by executing JavaScript code within the rundll32.exe process.
['T1547.001']
KOCTOPUS can set the AutoRun Registry key with a PowerShell command.
['T1547.001']
Kasidet creates a Registry Run key to establish persistence.
['T1547.001']
Kazuar adds a sub-key under several Registry run keys.
['T1547.001']
Kimsuky has placed scripts in the startup folder for persistence and modified the `HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce` Registry key.
['T1547.001']
Koadic has added persistence to the `HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run` Registry key.
['T1547.001']
Lazarus Group has maintained persistence by loading malicious code into a startup folder or by adding a Registry Run key.
['T1547.001']
LazyScripter has achieved persistence via writing a PowerShell script to the autorun registry key.
['T1547.001']
Leviathan has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor.
['T1547.001', 'T1547.009']
LoJax has modified the Registry key "‘HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\BootExecute’" from "‘autocheck autochk *’" to "‘autocheck autoche *’" in order to execute its payload during Windows startup.
['T1547.001']
LookBack sets up a Registry Run key to establish a persistence mechanism.
['T1547.001']
Lucifer can persist by setting Registry key values "HKLM\Software\Microsoft\Windows\CurrentVersion\Run\QQMusic" and "HKCU\Software\Microsoft\Windows\CurrentVersion\Run\QQMusic".
['T1547.001']
MCMD can use Registry Run Keys for persistence.
['T1547.001']
Machete used the startup folder for persistence.
['T1547.001']
MarkiRAT can drop its payload into the Startup directory to ensure it automatically runs when the compromised system is started.
['T1547.001']
Maze has created a file named "startup_vrun.bat" in the Startup folder of a virtual machine to establish persistence.
['T1547.001']
Mivast creates the following Registry entry: "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Micromedia".
['T1547.001']
Mongall can establish persistence with the auto start function including using the value `EverNoteTrayUService`.
['T1547.001']
Mosquito establishes persistence under the Registry key "HKCU\Software\Run auto_update".
['T1547.001']
Most Sakula samples maintain persistence by setting the Registry Run key "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\" in the HKLM or HKCU hive, with the Registry value and file name varying by sample.
['T1547.001']
NOKKI has established persistence by writing the payload to the Registry key "HKCU\Software\Microsoft\Windows\CurrentVersion\Run".
['T1547.001']
Naikon has modified a victim's Windows Run registry to establish persistence.
['T1547.001']
NanHaiShu modifies the %regrun% Registry to point itself to an autostart mechanism.
['T1547.001']
NavRAT creates a Registry key to ensure a file gets executed upon reboot in order to establish persistence.
['T1547.001']
ObliqueRAT can gain persistence by a creating a shortcut in the infected user's Startup directory.
['T1547.001']
Octopus achieved persistence by placing a malicious executable in the startup directory and has added the "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" key to the Registry.
['T1547.001']
Okrum establishes persistence by creating a .lnk shortcut to itself in the Startup folder.
['T1547.001']
PLAINTEE gains persistence by adding the Registry key "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce".
['T1547.001']
POWERSOURCE achieves persistence by setting a Registry Run key, with the path depending on whether the victim account has user or administrator access.
['T1547.001']
POWERTON can install a Registry Run key for persistence.
['T1547.001']
PROMETHIUM has used Registry run keys to establish persistence.
['T1547.001']
PUNCHBUGGY has been observed using a Registry Run key.
['T1547.001']
Patchwork has added the path of its second-stage malware to the startup folder to achieve persistence. One of its file stealers has also persisted by adding a Registry Run key.
['T1547.001']
PlugX adds Run key entries in the Registry to establish persistence.
['T1547.001']
PoisonIvy creates run key Registry entries pointing to a malicious executable dropped to disk.
['T1547.001']
PowerShower sets up persistence with a Registry run key.
['T1547.001']
PowerSploit's "New-UserPersistenceOption" Persistence argument can be used to establish via the "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" Registry key.
['T1547.001']
Prikormka adds itself to a Registry Run key with the name guidVGA or guidVSA.
['T1547.001']
Pteranodon copies itself to the Startup folder to establish persistence.
['T1547.001']
Pupy adds itself to the startup folder or adds itself to the Registry key "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run" for persistence.
['T1547.001']
QakBot can maintain persistence by creating an auto-run Registry key.
['T1547.001']
RCSession has the ability to modify a Registry Run key to establish persistence.
['T1547.001']
RTM has used Registry run keys to establish persistence for the RTM Trojan and other tools, such as a modified version of TeamViewer remote desktop software.
['T1547.001']
Ramsay has created Registry Run keys to establish persistence.
['T1547.001']
Reaver creates a shortcut file and saves it in a Startup folder to establish persistence.
['T1547.001', 'T1547.009']
RedLeaves attempts to add a shortcut file in the Startup folder to achieve persistence. If this fails, it attempts to add Registry Run keys.
['T1547.001']
Remcos can add itself to the Registry key "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" for persistence.
['T1547.001']
Remexi utilizes Run Registry keys in the HKLM hive as a persistence mechanism.
['T1547.001']
Revenge RAT creates a Registry key at "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell" to survive a system reboot.
['T1547.001']
Rifdoor has created a new registry entry at "HKEY_CURRENT_USERS\Software\Microsoft\Windows\CurrentVersion\Run\Graphics" with a value of "C:\ProgramData\Initech\Initech.exe /run".
['T1547.001']
RunningRAT adds itself to the Registry key "Software\Microsoft\Windows\CurrentVersion\Run" to establish persistence upon reboot.
['T1547.001']
S-Type may create a .lnk file to itself that is saved in the Start menu folder. It may also create the Registry key "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ IMJPMIJ8.1{3 characters of Unique Identifier}".
['T1547.001']
SHIPSHAPE achieves persistence by creating a shortcut in the Startup folder.
['T1547.001', 'T1547.009']
SILENTTRINITY can establish a LNK file in the startup folder for persistence.
['T1547.001']
SNUGRIDE establishes persistence through a Registry Run key.
['T1547.001']
SPACESHIP achieves persistence by creating a shortcut in the current user's Startup folder.
['T1547.001', 'T1547.009']
STARWHALE can establish persistence by installing itself in the startup folder, whereas the GO variant has created a `HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OutlookM` registry key.
['T1547.001']