DS0024 Windows Registry
A Windows OS hierarchical database that stores much of the information and settings for software programs, hardware devices, user preferences, and operating-system configurations1
Item | Value |
---|---|
ID | DS0024 |
Platforms | Windows |
Collection Layers | Host |
Version | 1.0 |
Created | 20 October 2021 |
Last Modified | 11 May 2022 |
Data Components
Windows Registry Key Access
Opening a Registry Key, typically to read the associated value (ex: Windows EID 4656)
Domain | ID | Name |
---|---|---|
enterprise | T1652 | Device Driver Discovery |
enterprise | T1003 | OS Credential Dumping |
enterprise | T1003.002 | Security Account Manager |
enterprise | T1003.004 | LSA Secrets |
enterprise | T1012 | Query Registry |
enterprise | T1649 | Steal or Forge Authentication Certificates |
enterprise | T1614 | System Location Discovery |
enterprise | T1614.001 | System Language Discovery |
enterprise | T1033 | System Owner/User Discovery |
enterprise | T1552 | Unsecured Credentials |
enterprise | T1552.002 | Credentials in Registry |
Windows Registry Key Creation
Initial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
Windows Registry Key Deletion
Removal of a Registry Key (ex: Windows EID 4658 or Sysmon EID 12)
Domain | ID | Name |
---|---|---|
enterprise | T1562 | Impair Defenses |
enterprise | T1562.001 | Disable or Modify Tools |
enterprise | T1070 | Indicator Removal |
enterprise | T1070.009 | Clear Persistence |
ics | T0872 | Indicator Removal on Host |
enterprise | T1112 | Modify Registry |
Windows Registry Key Modification
Changes made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
References
-
Microsoft. (2018, May 31). Registry. Retrieved September 29, 2021. ↩
-
Microsoft. (2016, August 31). Registry (Global Object Access Auditing). Retrieved January 31, 2018. ↩
-
Microsoft. (2012, July 2). Audit Registry. Retrieved January 31, 2018. ↩
-
Graeber, M. (2017, September). Subverting Trust in Windows. Retrieved January 31, 2018. ↩
-
Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016. ↩
-
Demaske, M. (2016, September 23). USING NETSHELL TO EXECUTE EVIL DLLS AND PERSIST ON A HOST. Retrieved April 8, 2017. ↩
-
Graeber, M. (2014, October). Analysis of Malicious Security Support Provider DLLs. Retrieved March 1, 2017. ↩
-
Microsoft. (2013, July 31). Configuring Additional LSA Protection. Retrieved June 24, 2015. ↩
-
M. (n.d.). Implementing Control Panel Items. Retrieved January 18, 2018. ↩
-
Abrams, L. (2021, March 19). REvil ransomware has a new ‘Windows Safe Mode’ encryption mode. Retrieved June 23, 2021. ↩
-
Sophos. (2019, December 9). Snatch ransomware reboots PCs into Safe Mode to bypass protection. Retrieved June 23, 2021. ↩
-
Smith, T. (2016, October 27). AppUNBlocker: Bypassing AppLocker. Retrieved December 19, 2017. ↩
-
Parisi, T., et al. (2017, July). Using Outlook Forms for Lateral Movement and Persistence. Retrieved February 5, 2019. ↩
-
Soutcast. (2018, September 14). Outlook Today Homepage Persistence. Retrieved February 5, 2019. ↩
-
Shukrun, S. (2019, June 2). Office Templates and GlobalDotName - A Stealthy Office Persistence Technique. Retrieved August 26, 2019. ↩
-
Knowles, W. (2017, April 21). Add-In Opportunities for Office Persistence. Retrieved July 3, 2017. ↩
-
Miroshnikov, A. & Hall, J. (2017, April 18). 4657(S): A registry value was modified. Retrieved August 9, 2018. ↩
-
Nelson, M. (2016, August 15). “Fileless” UAC Bypass using eventvwr.exe and Registry Hijacking. Retrieved December 27, 2016. ↩
-
Nelson, M. (2017, March 14). Bypassing UAC using App Paths. Retrieved May 25, 2017. ↩
-
Nelson, M. (2017, March 17). “Fileless” UAC Bypass Using sdclt.exe. Retrieved May 25, 2017. ↩
-
Ewing, P. Strom, B. (2016, September 15). How to Hunt: Detecting Persistence & Evasion with the COM. Retrieved September 15, 2016. ↩
-
Falcone, R. (2016, July 20). Technical Walkthrough: Office Test Persistence Method Used In Recent Sofacy Attacks. Retrieved July 3, 2017. ↩
-
Chandel, R. (2021, April 22). Defense Evasion: Windows Event Logging (T1562.002). Retrieved September 14, 2021. ↩
-
Heiligenstein, L. (n.d.). REP-25: Disable Windows Event Logging. Retrieved April 7, 2022. ↩
-
Microsoft. (2021, December 14). Registry Trees for Devices and Drivers. Retrieved March 28, 2023. ↩
-
Schroeder, W. & Christensen, L. (2021, June 22). Certified Pre-Owned - Abusing Active Directory Certificate Services. Retrieved August 2, 2022. ↩
-
Syynimaa, N. (2022, February 15). Stealing and faking Azure AD device identities. Retrieved August 3, 2022. ↩