Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1112 | Modify Registry |
Reg may be used to interact with and modify the Windows Registry of a local or remote system at the command-line interface.[1] |
|
Enterprise | T1012 | Query Registry |
Reg may be used to gather details from the Windows Registry of a local or remote system at the command-line interface.[1] |
|
Enterprise | T1552 | .002 | Unsecured Credentials: Credentials in Registry |
Reg may be used to find credentials in the Windows Registry.[3] |
ID | Name | References |
---|---|---|
G0075 | Rancor | |
G0049 | OilRig | |
G1034 | Daggerfly |
Daggerfly has used Reg to dump various Windows registry hives from victim machines.[7] |
G0035 | Dragonfly | |
G0093 | GALLIUM | |
G0010 | Turla | |
G0047 | Gamaredon Group |
Gamaredon Group has used Reg to add Run keys to the Registry.[11] |
G1017 | Volt Typhoon |
ID | Name | Description |
---|---|---|
C0006 | Operation Honeybee |