DS0024 Windows Registry
A Windows OS hierarchical database that stores much of the information and settings for software programs, hardware devices, user preferences, and operating-system configurations1
Item | Value |
---|---|
ID | DS0024 |
Platforms | Windows |
Collection Layers | Host |
Version | 1.0 |
Created | 20 October 2021 |
Last Modified | 20 October 2021 |
Data Components
Windows Registry Key Access
Opening a Registry Key, typically to read the associated value (ex: Windows EID 4656)
Domain | ID | Name |
---|---|---|
enterprise | T1003 | OS Credential Dumping |
enterprise | T1003.002 | Security Account Manager |
enterprise | T1003.004 | LSA Secrets |
enterprise | T1012 | Query Registry |
enterprise | T1614 | System Location Discovery |
enterprise | T1614.001 | System Language Discovery |
enterprise | T1033 | System Owner/User Discovery |
enterprise | T1552 | Unsecured Credentials |
enterprise | T1552.002 | Credentials in Registry |
Windows Registry Key Creation
Initial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
Domain | ID | Name |
---|---|---|
enterprise | T1547 | Boot or Logon Autostart Execution |
enterprise | T1547.001 | Registry Run Keys / Startup Folder |
enterprise | T1547.014 | Active Setup |
enterprise | T1037 | Boot or Logon Initialization Scripts |
enterprise | T1037.001 | Logon Script (Windows) |
enterprise | T1176 | Browser Extensions |
enterprise | T1543 | Create or Modify System Process |
enterprise | T1543.003 | Windows Service |
enterprise | T1562 | Impair Defenses |
enterprise | T1562.002 | Disable Windows Event Logging |
enterprise | T1562.009 | Safe Mode Boot |
enterprise | T1112 | Modify Registry |
enterprise | T1137 | Office Application Startup |
enterprise | T1137.001 | Office Template Macros |
enterprise | T1137.002 | Office Test |
enterprise | T1137.006 | Add-ins |
enterprise | T1553 | Subvert Trust Controls |
enterprise | T1553.004 | Install Root Certificate |
Windows Registry Key Deletion
Removal of a Registry Key (ex: Windows EID 4658 or Sysmon EID 12)
Domain | ID | Name |
---|---|---|
enterprise | T1562 | Impair Defenses |
enterprise | T1562.001 | Disable or Modify Tools |
enterprise | T1070 | Indicator Removal on Host |
enterprise | T1112 | Modify Registry |
Windows Registry Key Modification
Changes made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
References
-
Microsoft. (2018, May 31). Registry. Retrieved September 29, 2021. ↩
-
Chandel, R. (2021, April 22). Defense Evasion: Windows Event Logging (T1562.002). Retrieved September 14, 2021. ↩
-
Parisi, T., et al. (2017, July). Using Outlook Forms for Lateral Movement and Persistence. Retrieved February 5, 2019. ↩
-
Soutcast. (2018, September 14). Outlook Today Homepage Persistence. Retrieved February 5, 2019. ↩
-
Shukrun, S. (2019, June 2). Office Templates and GlobalDotName - A Stealthy Office Persistence Technique. Retrieved August 26, 2019. ↩
-
Knowles, W. (2017, April 21). Add-In Opportunities for Office Persistence. Retrieved July 3, 2017. ↩
-
Abrams, L. (2021, March 19). REvil ransomware has a new ‘Windows Safe Mode’ encryption mode. Retrieved June 23, 2021. ↩
-
Sophos. (2019, December 9). Snatch ransomware reboots PCs into Safe Mode to bypass protection. Retrieved June 23, 2021. ↩
-
Smith, T. (2016, October 27). AppUNBlocker: Bypassing AppLocker. Retrieved December 19, 2017. ↩
-
Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016. ↩
-
Falcone, R. (2016, July 20). Technical Walkthrough: Office Test Persistence Method Used In Recent Sofacy Attacks. Retrieved July 3, 2017. ↩
-
Ewing, P. Strom, B. (2016, September 15). How to Hunt: Detecting Persistence & Evasion with the COM. Retrieved September 15, 2016. ↩
-
M. (n.d.). Implementing Control Panel Items. Retrieved January 18, 2018. ↩
-
Graeber, M. (2014, October). Analysis of Malicious Security Support Provider DLLs. Retrieved March 1, 2017. ↩
-
Microsoft. (2013, July 31). Configuring Additional LSA Protection. Retrieved June 24, 2015. ↩
-
Microsoft. (2016, August 31). Registry (Global Object Access Auditing). Retrieved January 31, 2018. ↩
-
Microsoft. (2012, July 2). Audit Registry. Retrieved January 31, 2018. ↩
-
Graeber, M. (2017, September). Subverting Trust in Windows. Retrieved January 31, 2018. ↩
-
Miroshnikov, A. & Hall, J. (2017, April 18). 4657(S): A registry value was modified. Retrieved August 9, 2018. ↩
-
Nelson, M. (2016, August 15). “Fileless” UAC Bypass using eventvwr.exe and Registry Hijacking. Retrieved December 27, 2016. ↩
-
Nelson, M. (2017, March 14). Bypassing UAC using App Paths. Retrieved May 25, 2017. ↩
-
Nelson, M. (2017, March 17). “Fileless” UAC Bypass Using sdclt.exe. Retrieved May 25, 2017. ↩
-
Demaske, M. (2016, September 23). USING NETSHELL TO EXECUTE EVIL DLLS AND PERSIST ON A HOST. Retrieved April 8, 2017. ↩