Reg

Reg is a Windows utility used to interact with the Windows Registry. It can be used at the command-line interface to query, add, modify, and remove information. [1]

Utilities such as Reg are known to be used by persistent threats. [2]

ID: S0075
Associated Software: reg.exe
Type: TOOL
Platforms: Windows
Version: 1.1
Created: 31 May 2017
Last Modified: 13 October 2022

Techniques Used

Domain ID Name Use
Enterprise T1112 Modify Registry

Reg may be used to interact with and modify the Windows Registry of a local or remote system at the command-line interface.[1]

Enterprise T1012 Query Registry

Reg may be used to gather details from the Windows Registry of a local or remote system at the command-line interface.[1]

Enterprise T1552 .002 Unsecured Credentials: Credentials in Registry

Reg may be used to find credentials in the Windows Registry.[3]

Groups That Use This Software

ID Name References
G0075 Rancor

[4]

G0049 OilRig

[5][6]

G1034 Daggerfly

Daggerfly has used Reg to dump various Windows registry hives from victim machines.[7]

G0035 Dragonfly

[8]

G0093 GALLIUM

[9]

G0010 Turla

[10]

G0047 Gamaredon Group

Gamaredon Group has used Reg to add Run keys to the Registry.[11]

G1017 Volt Typhoon

[12]

Campaigns

ID Name Description
C0006 Operation Honeybee

[13]

References