A Windows OS hierarchical database that stores much of the information and settings for software programs, hardware devices, user preferences, and operating-system configurations[1]
Opening a Registry Key, typically to read the associated value (ex: Windows EID 4656)
Opening a Registry Key, typically to read the associated value (ex: Windows EID 4656)
Domain | ID | Name | Detects | |
---|---|---|---|---|
Enterprise | T1652 | Device Driver Discovery |
Monitor for attempts to access information stored in the Registry about devices and their associated drivers, such as values under |
|
Enterprise | T1003 | OS Credential Dumping |
Monitor for the SAM registry key being accessed that may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password, from the operating system and software. Analytic 1 - Unauthorized registry access to SAM key.
|
|
.002 | Security Account Manager |
Monitor for the SAM registry key dump being created to access stored account password hashes. Some hash dumpers will open the local file system as a device and parse to the SAM table to avoid file access defenses. Others will make an in-memory copy of the SAM table before reading hashes. Detection of compromised Valid Accounts in-use by adversaries may help as well. Analytic 1 - Unauthorized registry access to SAM key.
|
||
.004 | LSA Secrets |
Monitor for the LSA secrets are stored in the registry at Analytic 1 - Unauthorized registry access to LSA secrets.
|
||
Enterprise | T1012 | Query Registry |
Monitor for unexpected process interactions with the Windows Registry (i.e. reads) that may be related to gathering information. Note: For Security Auditing event ids 4656 and 4663, a System Access Control List (SACL) that controls the use of specific access rights such as Enumerate sub-keys and Query key value is required for event generation. Depending on the Registry key you are monitoring, the implementation of a new System Access Control List (SACL) might be required. Depending of Registry key used for the creation of a System Access Control List (SACL), the generation of event ids 4656 and 4663 might be noisy. Analytic 1 - Suspicious Registry
|
|
Enterprise | T1649 | Steal or Forge Authentication Certificates |
Monitor for attempts to access information stored in the Registry about certificates and their associated private keys. For example, user certificates are commonly stored under |
|
Enterprise | T1614 | .001 | System Location Discovery: System Language Discovery |
Monitor for access to windows registry keys that may attempt to gather information about the system language of a victim in order to infer the geographical location of that host. |
Enterprise | T1033 | System Owner/User Discovery |
Monitor for the SAM registry key being accessed that may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password, from the operating system and software. |
|
Enterprise | T1552 | Unsecured Credentials |
Monitor for unexpected windows registry key being accessed that may search compromised systems to find and obtain insecurely stored credentials. Analytic 1 - Unauthorized access to registry keys associated with credentials.
|
|
.002 | Credentials in Registry |
Monitor for unexpected windows registry key being accessed that may search the Registry on compromised systems for insecurely stored credentials. Analytic 1 - Unauthorized access to registry keys associated with credentials.
|
Initial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
Initial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
Domain | ID | Name | Detects | |
---|---|---|---|---|
Enterprise | T1547 | Boot or Logon Autostart Execution |
Monitor for additions of mechanisms that could be used to trigger autostart execution, such as relevant additions to the Registry. |
|
.001 | Registry Run Keys / Startup Folder |
Monitor for newly created windows registry keys that may achieve persistence by adding a program to a startup folder or referencing it with a Registry run key. |
||
.014 | Active Setup |
Monitor Registry key additions to |
||
Enterprise | T1037 | Boot or Logon Initialization Scripts |
Monitor for newly constructed windows registry keys that may use scripts automatically executed at boot or logon initialization to establish persistence. |
|
.001 | Logon Script (Windows) |
Monitor for the creation to Registry keys associated with Windows logon scrips, nameley Adversaries may schedule software to run whenever a user logs into the system; this is done to establish persistence and sometimes for lateral movement. This trigger is established through the registry key HKEY_CURRENT_USER\EnvironmentUserInitMprLogonScript. This signature looks edits to existing keys or creation of new keys in that path. Users purposefully adding benign scripts to this path will result in false positives; that case is rare, however. There are other ways of running a script at startup or login that are not covered in this signature. Note that this signature overlaps with the Windows Sysinternals Autoruns tool, which would also show changes to this registry path. Analytic 1 - Boot or Logon Initialization Scripts
|
||
Enterprise | T1176 | Browser Extensions |
Monitor for any new items written to the Registry or PE files written to disk. That may correlate with browser extension installation. |
|
Enterprise | T1543 | Create or Modify System Process |
Monitor for newly constructed windows registry keys that may create or modify system-level processes to repeatedly execute malicious payloads as part of persistence. |
|
.003 | Windows Service |
Monitor for new constructed windows registry keys that may create or modify Windows services to repeatedly execute malicious payloads as part of persistence. Analytic 1 - Creation of the HKLM\System\CurrentControlSet\Services Registry key
|
||
Enterprise | T1562 | .002 | Impair Defenses: Disable Windows Event Logging |
Monitor the addition of the MiniNT registry key in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control, which may disable Event Viewer.[6][7] |
.009 | Impair Defenses: Safe Mode Boot |
Monitor Registry creation for services that may start on safe mode. For example, a program can be forced to start on safe mode boot by adding a |
||
Enterprise | T1556 | Modify Authentication Process |
Monitor for the addition of network provider Registry keys (e.g., Analytic 1 - Unauthorized addition of network provider Registry keys.
|
|
.008 | Network Provider DLL |
Monitor for the addition of network provider Registry keys (e.g., |
||
Enterprise | T1112 | Modify Registry |
Monitor for newly constructed registry keys or values to aid in persistence and execution. Detection of creation of registry key Analytic 1 - Registry Edit with Creation of SafeDllSearchMode Key Set to 0
|
|
Enterprise | T1027 | Obfuscated Files or Information |
Monitor for the creation of Registry values that may highlight storage of malicious data such as commands or payloads. |
|
.011 | Fileless Storage |
Monitor for the creation of Registry values that may highlight storage of malicious data such as commands or payloads. |
||
Enterprise | T1137 | Office Application Startup |
Many Office-related persistence mechanisms require changes to the Registry and for binaries, files, or scripts to be written to disk or existing files modified to include malicious scripts. Collect events related to Registry key creation and modification for keys that could be used for Office-based persistence.[10][11] |
|
.001 | Office Template Macros |
Collect events related to Registry key creation for keys that could be used for Office-based persistence.[10][11] |
||
.002 | Office Test |
Monitor for the creation of the Office Test Registry key. Collect events related to Registry key creation for keys that could be used for Office-based persistence. Since v13.52, Autoruns can detect tasks set up using the Office Test Registry key.[12] |
||
.006 | Add-ins |
Audit the Registry entries relevant for enabling add-ins.[13][14] |
||
Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task |
Monitor for newly constructed registry keys upon creation of new task. Deletion of values/keys in the registry may further indicate malicious activity. Analytic 1 - Suspicious Creations under Schedule Registry Key
|
Enterprise | T1553 | Subvert Trust Controls |
Monitoring the creation of (sub)keys within the Windows Registry may reveal malicious attempts to modify trust settings, such as the installation of root certificates. Installed root certificates are located in the Registry under |
|
.004 | Install Root Certificate |
Monitoring the creation of (sub)keys within the Windows Registry may reveal malicious root certificate installation. Installed root certificates are located in the Registry under There are a subset of root certificates that are consistent across Windows systems and can be used for comparison: [15]* 18F7C1FCC3090203FD5BAA2F861A754976C8DD25* 245C97DF7514E7CF2DF8BE72AE957B9E04741E85* 3B1EFD3A66EA28B16697394703A72CA340A05BD5* 7F88CD7223F3C813818C994614A89C99FA3B5247* 8F43288AD272F3103B6FB1428485EA3014C0BCFE* A43489159A520F0D93D032CCAF37E7FE20A8B419* BE36A4562FB2EE05DBB3D32323ADF445084ED656* CDD4EEAE6000AC7F40C3802C171E30148030C072 |
Removal of a Registry Key (ex: Windows EID 4658 or Sysmon EID 12)
Removal of a Registry Key (ex: Windows EID 4658 or Sysmon EID 12)
Domain | ID | Name | Detects | |
---|---|---|---|---|
Enterprise | T1562 | Impair Defenses |
Monitor for unexpected deletion of windows registry keys that that may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. |
|
.001 | Disable or Modify Tools |
Monitor for deletion of Windows Registry keys and/or values related to services and startup programs that correspond to security tools such as HKLM:\SOFTWARE\Microsoft\AMSI\Providers. |
||
Enterprise | T1070 | Indicator Removal |
Monitor windows registry keys that may be deleted or alter generated artifacts on a host system, including logs or captured files such as quarantined malware. |
|
.009 | Clear Persistence |
Monitor windows registry keys that may be deleted or alter generated artifacts associated with persistence on a host system. |
||
ICS | T0872 | Indicator Removal on Host |
Monitor Windows registry keys that may be deleted or alter generated artifacts on a host system, including logs or captured files such as quarantined malware. For added context on adversary procedures and background see Indicator Removal and applicable sub-techniques. |
|
Enterprise | T1112 | Modify Registry |
Monitor for unexpected deletion of windows registry keys to hide configuration information, remove information as part of cleaning up, or as part of other techniques to aid in persistence and execution. |
Changes made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
Changes made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
Domain | ID | Name | Detects | |
---|---|---|---|---|
Enterprise | T1548 | Abuse Elevation Control Mechanism |
There are many ways to perform UAC bypasses when a user is in the local administrator group on a system, so it may be difficult to target detection on all variations. Efforts should likely be placed on mitigation and collecting enough information on process launches and actions that could be performed before and after a UAC bypass is performed. Some UAC bypass methods rely on modifying specific, user-accessible Registry settings. Analysts should monitor Registry settings for unauthorized changes. |
|
.002 | Bypass User Account Control |
Some UAC bypass methods rely on modifying specific, user-accessible Registry settings. For example:* The UAC Bypass is an interesting technique in that new implementations are regularly found and existing implementations may be fixed (i.e., patched) by Microsoft in new builds of Windows. Therefore, it is important to validate than detections for UAC Bypass are still relevant (i.e., they target non-patched implementations). Note: Sysmon Event ID 12 (Registry Key Create/Delete), Sysmon Event ID 13 (Registry Value Set), and Sysmon Event ID 14 (Registry Key and Value Rename) are useful for creating detections around Registry Key Modification in the context of UAC Bypass. |
||
Enterprise | T1557 | Adversary-in-the-Middle |
Monitor HKLM\Software\Policies\Microsoft\Windows NT\DNSClient for changes to the "EnableMulticast" DWORD value. A value of "0" indicates LLMNR is disabled. |
|
.001 | LLMNR/NBT-NS Poisoning and SMB Relay |
Monitor HKLM\Software\Policies\Microsoft\Windows NT\DNSClient for changes to the "EnableMulticast" DWORD value. A value of "0" indicates LLMNR is disabled. |
||
ICS | T0830 | Adversary-in-the-Middle |
Monitor HKLM\Software\Policies\Microsoft\Windows NT\DNSClient for changes to the "EnableMulticast" DWORD value. A value of "0" indicates LLMNR is disabled. |
|
Enterprise | T1547 | Boot or Logon Autostart Execution |
Monitor for modifications of mechanisms that could be used to trigger autostart execution, such as relevant additions to the Registry. |
|
.001 | Registry Run Keys / Startup Folder |
Monitor Registry for changes to run keys that do not correlate with known software, patch cycles, etc. Tools such as Sysinternals Autoruns may also be used to detect system changes that could be attempts at persistence, including listing the run keys' Registry locations. [5] Detection of the modification of the registry key Analytic 1 - Modification of Default Startup Folder in the Registry Key ‘Common Startup’
|
||
.002 | Authentication Package |
Monitor the Registry for changes to the LSA Registry keys. Windows 8.1 and Windows Server 2012 R2 may generate events when unsigned DLLs try to load into the LSA by setting the Registry key |
||
.003 | Time Providers |
Monitor for changes made to windows registry keys and/or values modifying W32Time information in the Registry. |
||
.004 | Winlogon Helper DLL |
Monitor for changes to Registry entries associated with Winlogon that do not correlate with known software, patch cycles, etc. Tools such as Sysinternals Autoruns may also be used to detect system changes that could be attempts at persistence, including listing current Winlogon helper values. [5] Analytic 1 - Registry Edit with Modification of Userinit, Shell or Notify
|
||
.005 | Security Support Provider |
Monitor the Registry for changes to the SSP Registry keys. Windows 8.1 and Windows Server 2012 R2 may generate events when unsigned SSP DLLs try to load into the LSA by setting the Registry key |
||
.010 | Port Monitors |
Monitor Registry writes to |
||
.012 | Print Processors |
Monitor Registry writes to |
||
.014 | Active Setup |
Monitor Registry key modifications to |
||
Enterprise | T1543 | Create or Modify System Process |
Monitor for changes to windows registry keys and/or values that may create or modify system-level processes to repeatedly execute malicious payloads as part of persistence. |
|
.003 | Windows Service |
Look for changes to service Registry entries that do not correlate with known software, patch cycles, etc. Service information is stored in the Registry at Analytic 1 - Modification of the HKLM\System\CurrentControlSet\Services Registry key
|
||
Enterprise | T1074 | Data Staged |
Consider monitoring accesses and modifications to local storage repositories (such as the Windows Registry), especially from suspicious processes that could be related to malicious data collection. |
|
.001 | Local Data Staging |
Consider monitoring accesses and modifications to local storage repositories (such as the Windows Registry), especially from suspicious processes that could be related to malicious data collection. |
||
Enterprise | T1546 | Event Triggered Execution |
Monitor for changes made to windows registry keys and/or values that may establish persistence and/or elevate privileges using system mechanisms that trigger execution based on specific events. |
|
.001 | Change Default File Association |
Collect and analyze changes to Registry keys that associate file extensions to default applications for execution and correlate with unknown process launch activity or unusual file types for that process. User file association preferences are stored under |
||
.002 | Screensaver |
Monitor changes to screensaver configuration changes in the Registry that may not correlate with typical user behavior. Tools such as Sysinternals Autoruns can be used to detect changes to the screensaver binary path in the Registry. Default screen saver files are stored in C:\Windows\System32. Use these files as a reference when defining list of not suspicious screen saver files. Analytic 1 - Registry Edit from Screensaver
|
||
.007 | Netsh Helper DLL |
Monitor the |
||
.008 | Accessibility Features |
Monitor Registry keys within |
||
.009 | AppCert DLLs |
Monitor the AppCertDLLs Registry value for modifications that do not correlate with known software, patch cycles, etc. |
||
.010 | AppInit DLLs |
Monitor the AppInit_DLLs Registry values for modifications that do not correlate with known software, patch cycles, etc. Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes. Dynamic-link libraries (DLLs) that are specified in the AppInit_DLLs value in the Registry keys HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows or HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Windows are loaded by user32.dll into every process that loads user32.dll. These values can be abused to obtain elevated privileges by causing a malicious DLL to be loaded and run in the context of separate processes. Accordingly, this analytic looks for modifications to these registry keys that may be indicative of this type of abuse. Analytic 1 - AppInit DLLs
|
||
.011 | Application Shimming |
Monitor for changes to windows registry keys and/or values that may establish persistence and/or elevate privileges by executing malicious content triggered by application shims. |
||
.012 | Image File Execution Options Injection |
Monitor Registry values associated with IFEOs, as well as silent process exit monitoring, for modifications that do not correlate with known software, patch cycles, etc. |
||
.015 | Component Object Model Hijacking |
There are opportunities to detect COM hijacking by searching for Registry references that have been replaced and through Registry operations (ex: Reg) replacing known binary paths with unknown paths or otherwise malicious content. Even though some third-party applications define user COM objects, the presence of objects within HKEY_CURRENT_USER\Software\Classes\CLSID\ may be anomalous and should be investigated since user objects will be loaded prior to machine objects in HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID.[22] Registry entries for existing COM objects may change infrequently. When an entry with a known good path and binary is replaced or changed to an unusual value to point to an unknown binary in a new location, then it may indicate suspicious behavior and should be investigated. Analytic 1 - Component Object Model Hijacking
|
||
Enterprise | T1564 | Hide Artifacts |
Monitor for changes made to windows registry keys and/or values that may attempt to hide artifacts associated with their behaviors to evade detection. |
|
.002 | Hidden Users |
Monitor for changes made to windows registry key or values for unexpected modifications of the |
||
.005 | Hidden File System |
Monitor for changes made to windows registry keys and/or values that may use a hidden file system to conceal malicious activity from users and security tools. |
||
.006 | Run Virtual Instance |
Monitor for changes made to Windows Registry keys and/or values that may be the result of using a virtual instance to avoid detection. For example, if virtualization software is installed by the adversary the Registry may provide detection opportunities. |
||
Enterprise | T1574 | Hijack Execution Flow |
Monitor for changes made to windows registry keys and/or values that may execute their own malicious payloads by hijacking the way operating systems run programs. |
|
.007 | Path Interception by PATH Environment Variable |
Monitor for modifications of PATH environment variable Registry keys such as |
||
.011 | Services Registry Permissions Weakness |
Monitor for modification of Registry keys and values used by services such as HKLM\SYSTEM\CurrentControlSet\Services that may allow adversaries to launch their own code when a service starts. |
||
.012 | COR_PROFILER |
For detecting system and user scope abuse of the COR_PROFILER variable, monitor the Registry for changes to COR_ENABLE_PROFILING, COR_PROFILER, and COR_PROFILER_PATH that correspond to system and user environment variables that do not correlate to known developer tools. |
||
Enterprise | T1562 | Impair Defenses |
Monitor Registry edits for modifications to services and startup programs that correspond to security tools. |
|
.001 | Disable or Modify Tools |
Monitor for changes made to Windows Registry keys and/or values related to services and startup programs that correspond to security tools such as HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender. |
||
.002 | Disable Windows Event Logging |
Monitor the addition of the MiniNT registry key in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control, which may disable Event Viewer.[6] Adversaries may disable Windows event logging to limit data that can be leveraged for detections and audits. There are different ways to perform this attack.1. The first one is to create the Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\MiniNt. This action will not generate Security EventLog 4657 or Sysmon EventLog 13 because the value of the key remains empty. However, if an attacker uses powershell to perform this attack (and not cmd), a Security EventLog 4663 will be generated (but 4663 generates a lot of noise).2. The second way is to disable the service EventLog (display name Windows Event Log). After disabed, attacker must reboot the system. The action of disabling or put in manual the service will modify the Registry Key value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\start, therefore Security EventLog 4657 or Sysmon EventLog 13 will be generated on the system.3. The third way is linked with the second. By default, the EventLog service cannot be stopped. If an attacker tries to stop the service, this one will restart immediately. Why ? Because to stop completely, this service must stop others, one in particular called netprofm (display name Network List Service). This service remains running until it is disabled. So Attacker must either disable EventLog and after to stop it or disable netprofm and after stop EventLog. Only stopping the service (even as admin) will not have an effect on the EventLog service because of the link with netprofm. Security EventLog 1100 will log the stop of the EventLog service (but also generates a lot of noise because it will generate a log everytime the system shutdown).4. The fourth way is to use auditpol.exe to modify the audit configuration and disable/modify important parameters that will lead to disable the creation of EventLog.5. The last one is to modify the Registry Key value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\Security\file (or other kind of log) to modify the path where the EventLog are stocked. Importantly, with this technique, the EventViewer will use the value of the Registry Key "file" to know where to find the Log. Thus, using the EventViewer will always show the current event logs, but the old one will be stocked in another evtx. Also, the path must be in a folder that the Eventlog process has access (like it doesn’t work if attacker set up the new path in the Desktop). Attacker can also decrease the maxsize value of the Log to force the system to rewrite on the older EventLog (but the minimum cannot be less than 1028 KB). As the Registry key is modified, Security EventLog 4657 or Sysmon EventLog 13 will be generated on the system. All of these attacks required administrative right. Attacks number three, four and five do not require a system reboot to be effective immediately. Analytic 1 - Disable Windows Event Logging
|
||
.004 | Disable or Modify System Firewall |
Monitor for changes made to windows Registry keys and/or values that adversaries might use to disable or modify System Firewall settings such as |
||
.006 | Indicator Blocking |
To detect changes in ETW you can also monitor the registry key which contains configurations for all ETW event providers: |
||
.009 | Safe Mode Boot |
Monitor modifications to Registry data associated with enabling safe mode. For example, a service can be forced to start on safe mode boot by adding a |
||
Enterprise | T1070 | Indicator Removal |
Monitor for changes made to windows registry keys or values that may delete or alter generated artifacts on a host system, including logs or captured files such as quarantined malware. |
|
.007 | Clear Network Connection History and Configurations |
Monitor for changes to Registry keys (ex: |
||
.009 | Clear Persistence |
Monitor for changes made to windows registry keys or values that may delete or alter generated artifacts associated with persistence on a host system. |
||
ICS | T0872 | Indicator Removal on Host |
Monitor for changes made to Windows Registry keys or values that may delete or alter generated artifacts on a host system, including logs or captured files such as quarantined malware. For added context on adversary procedures and background see Indicator Removal and applicable sub-techniques. |
|
Enterprise | T1490 | Inhibit System Recovery |
Monitor the registry for changes associated with system recovery features (ex: the creation of |
|
Enterprise | T1056 | Input Capture |
Monitor for changes made to windows registry keys or values for unexpected modifications |
|
.001 | Keylogging |
Monitor for changes made to windows registry keys or values for unexpected modifications |
||
Enterprise | T1556 | Modify Authentication Process |
Monitor for changes to Registry entries for password filters (ex: Monitor for changes to Registry entries for network providers (e.g., Analytic 1 - Unauthorized modifications to Registry entries for password filters or network providers.
Analytic 2 - Unauthorized modification of windows Registry keys may modify authentication mechanism
|
|
.002 | Password Filter DLL |
Monitor for changes to Registry entries for password filters (ex: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Notification Packages) and correlate then investigate the DLL files these files reference. Analytic 1 - Unauthorized modifications to Registry entries for password filters.
|
||
.008 | Network Provider DLL |
Monitor for changes to Registry entries for network providers (e.g., |
||
Enterprise | T1112 | Modify Registry |
Monitor for changes made to windows registry keys or values. Consider enabling Registry Auditing on specific keys to produce an alertable event (Event ID 4657) whenever a value is changed (though this may not trigger when values are created with Reghide or other evasive methods). [23] Changes to Registry entries that load software on Windows startup that do not correlate with known software, patch cycles, etc., are suspicious, as are additions or changes to files within the startup folder. Changes could also include new services and modification of existing binary paths to point to malicious files. If a change to a service-related entry occurs, then it will likely be followed by a local or remote service start or restart to execute the file. Detection of modification of the registry key values of Notify, Userinit, and Shell located in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ and HKEY_LOCAL_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon. When a user logs on, the Registry key values of Notify, Userinit and Shell are used to load dedicated Windows component. Attackers may insert malicious payload following the legitimate value to launch a malicious payload. Detection of the modification of the registry key Common Startup located in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\ and HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders. When a user logs on, any files located in the Startup Folder are launched. Attackers may modify these folders with other files in order to evade detection set on these default folders. This detection focuses on EventIDs 4688 and 1 for process creation and EventID 4657 for the modification of the Registry Keys. Analytic 1 - Registry Edit with Modification of Userinit, Shell or Notify
Analytic 2 - Modification of Default Startup Folder in the Registry Key 'Common Startup'
|
|
Enterprise | T1111 | Multi-Factor Authentication Interception |
Monitor for changes to windows registry keys or values that may target multi-factor authentication mechanisms, such as smart cards, to gain access to credentials that can be used to access systems, services, and network resources. Analytic 1 - Unauthorized registry changes related to MFA settings.
|
|
Enterprise | T1137 | Office Application Startup |
Many Office-related persistence mechanisms require changes to the Registry and for binaries, files, or scripts to be written to disk or existing files modified to include malicious scripts. Collect events related to Registry key creation and modification for keys that could be used for Office-based persistence.[10][11] |
|
.001 | Office Template Macros |
Collect events related to Registry key modification for keys that could be used for Office-based persistence.[10][11] |
||
.002 | Office Test |
Monitor for changes made to the Office Test Registry key. Collect events related to Registry key modification for keys that could be used for Office-based persistence. Since v13.52, Autoruns can detect tasks set up using the Office Test Registry key.[12] |
||
.006 | Add-ins |
Audit the Registry entries relevant for enabling add-ins.[13][14] |
||
Enterprise | T1003 | .001 | OS Credential Dumping: LSASS Memory |
Monitor for changes to Registry entries associated with credential access that is stored in the process memory of the LSASS. For example, the adversary can modify the SAM and SYSTEM files. Analytics 1 - Unauthorized registry modifications related to LSASS.
|
Enterprise | T1505 | .005 | Server Software Component: Terminal Services DLL |
Monitor for changes to Registry keys associated with |
Enterprise | T1489 | Service Stop |
Monitor for changes made to windows registry keys and/or values that may stop or disable services on a system to render those services unavailable to legitimate users. |
|
ICS | T0881 | Service Stop |
Monitor for changes made to Windows registry keys and/or values that may stop or disable services on a system to render those services unavailable to legitimate users. |
|
ICS | T0856 | Spoof Reporting Message |
Various techniques enable spoofing a reporting message. Monitor for LLMNR/NBT-NS poisoning via new services/daemons which may be used to enable this technique. For added context on adversary procedures and background see LLMNR/NBT-NS Poisoning and SMB Relay. |
|
Enterprise | T1553 | Subvert Trust Controls |
Monitoring changes to the Windows Registry may reveal malicious attempts to modify trust settings, such as the installation of root certificates. Installed root certificates are located in the Registry under |
|
.003 | SIP and Trust Provider Hijacking |
Enable the Registry Global Object Access Auditing [24] setting in the Advanced Security Audit policy to apply a global system access control list (SACL) and event auditing on modifications to Registry values (sub)keys related to SIPs and trust providers:[25]* Note: As part of this technique, adversaries may attempt to manually edit these Registry keys (ex: Regedit) or utilize the legitimate registration process using Regsvr32.[26] Periodically baseline registered SIPs and trust providers (Registry entries and files on disk), specifically looking for new, modified, or non-Microsoft entries.[26] |
||
.004 | Install Root Certificate |
Monitoring changes to the Windows Registry may reveal malicious root certificate installation. Installed root certificates are located in the Registry under There are a subset of root certificates that are consistent across Windows systems and can be used for comparison: [15]* 18F7C1FCC3090203FD5BAA2F861A754976C8DD25* 245C97DF7514E7CF2DF8BE72AE957B9E04741E85* 3B1EFD3A66EA28B16697394703A72CA340A05BD5* 7F88CD7223F3C813818C994614A89C99FA3B5247* 8F43288AD272F3103B6FB1428485EA3014C0BCFE* A43489159A520F0D93D032CCAF37E7FE20A8B419* BE36A4562FB2EE05DBB3D32323ADF445084ED656* CDD4EEAE6000AC7F40C3802C171E30148030C072 |
||
.006 | Code Signing Policy Modification |
Consider monitoring for modifications made to Registry keys associated with code signing policies, such as |
||
Enterprise | T1218 | System Binary Proxy Execution |
Monitor for changes made to Windows Registry keys and/or values that may forge credential materials that can be used to gain access to web applications or Internet services. |
|
.002 | Control Panel |
Inventory Control Panel items to locate unregistered and potentially malicious files present on systems:* Executable format registered Control Panel items will have a globally unique identifier (GUID) and registration Registry entries in |
||
Enterprise | T1569 | System Services |
Monitor for changes made to windows registry keys and/or values that may abuse system services or daemons to execute commands or programs. Analytic 1 - Malicious service modification
|
|
.002 | Service Execution |
Monitor for changes made to windows registry keys and/or values that may abuse the Windows service control manager to execute malicious commands or payloads. Analytic 1 - Registry changes related to service execution.
|