Adversaries may clear artifacts associated with previously established persistence on a host system to remove evidence of their activity. This may involve various actions, such as removing services, deleting executables, Modify Registry, Plist File Modification, or other methods of cleanup to prevent defenders from collecting evidence of their persistent presence.[1] Adversaries may also delete accounts previously created to maintain persistence (i.e. Create Account).[2]
In some instances, artifacts of persistence may also be removed once an adversary’s persistence is executed in order to prevent errors with the new instance of the malware.[3]
ID | Name | Description |
---|---|---|
S0534 | Bazar |
Bazar's loader can delete scheduled tasks created by a previous instance of the malware.[3] |
S0632 | GrimAgent |
GrimAgent can delete previously created tasks on a compromised host.[4] |
S1132 | IPsec Helper |
IPsec Helper can delete various service traces related to persistent execution when commanded.[5] |
S0669 | KOCTOPUS |
KOCTOPUS can delete created registry keys used for persistence as part of its cleanup procedure.[6] |
S0500 | MCMD |
MCMD has the ability to remove set Registry Keys, including those used for persistence.[7] |
S0083 | Misdat |
Misdat is capable of deleting Registry keys used for persistence.[1] |
S0385 | njRAT |
njRAT is capable of manipulating and deleting registry keys, including those used for persistence.[8] |
S0517 | Pillowmint |
Pillowmint can uninstall the malicious service from an infected machine.[9] |
S1130 | Raspberry Robin |
Raspberry Robin uses a |
S0148 | RTM |
RTM has the ability to remove Registry entries that it created for persistence.[11] |
S0085 | S-Type | |
S0559 | SUNBURST |
SUNBURST removed IFEO registry values to clean up traces of persistence.[12] |
ID | Mitigation | Description |
---|---|---|
M1029 | Remote Data Storage |
Automatically forward events to a log server or data repository to prevent conditions in which the adversary can locate and manipulate data on the local system. When possible, minimize time delay on event reporting to avoid prolonged storage on the local system. |
M1022 | Restrict File and Directory Permissions |
Protect generated event files that are stored locally with proper permissions and authentication and limit opportunities for adversaries to increase privileges by preventing Privilege Escalation opportunities. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0017 | Command | Command Execution |
Monitor executed commands and arguments that may delete or alter generated artifacts associated with persistence on a host system. |
DS0022 | File | File Deletion |
Monitor for a file that may delete or alter generated artifacts associated with persistence on a host system. |
File Modification |
Monitor for changes made to a file may delete or alter generated artifacts associated with persistence on a host system. |
||
DS0009 | Process | Process Creation |
Monitor for newly executed processes that may delete or alter generated artifacts associated with persistence on a host system. |
DS0003 | Scheduled Job | Scheduled Job Modification |
Monitor for changes made to scheduled jobs that may attempt to remove artifacts on a host system. |
DS0002 | User Account | User Account Deletion |
Monitor for unexpected deletions of user accounts. Windows event logs may highlight activity associated with an adversary's attempt to remove an account (e.g., Alerting on these Event IDs may generate a high degree of false positives, so compare against baseline knowledge for how systems are typically used and correlate account modification events with other indications of malicious activity where possible. |
DS0024 | Windows Registry | Windows Registry Key Deletion |
Monitor windows registry keys that may be deleted or alter generated artifacts associated with persistence on a host system. |
Windows Registry Key Modification |
Monitor for changes made to windows registry keys or values that may delete or alter generated artifacts associated with persistence on a host system. |