prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
Boot or Logon Autostart Execution:Registry Run Keys
|
DarkComet adds several Registry entries to enable automatic execution at every system startup.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has been known to establish persistence by adding programs to the Run Registry key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
DarkTortilla has established persistence via the Software\Microsoft\Windows NT\CurrentVersion\Run registry key and by creating a .lnk shortcut file in the Windows startup folder.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
DnsSystem can write itself to the Startup folder to gain persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
DownPaper uses PowerShell to add a Registry Run key in order to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has added the registry value ntdll to the Registry Run key to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
DustySky achieves persistence by creating a Registry entry in HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
If establishing persistence by installation as a new service fails, one variant of Elise establishes persistence for the created .exe file by setting the following Registry key: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\svchost : %APPDATA%\Microsoft\Network\svchost.exe. Other variants have set the following Registry keys for persistence: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\imejp : [self] and HKCU\Software\Microsoft\Windows\CurrentVersion\Run\IAStorD.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Variants of Emissary have added Run Registry keys to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Emotet has been observed adding the downloaded payload to the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run key to maintain persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Empire can modify the registry run keys HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run and HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run for persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
EvilBunny has created Registry keys for persistence in [HKLM|HKCU]\…\CurrentVersion\Run.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
EvilGrab adds a Registry Run key for ctfmon.exe to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
EVILNUM can achieve persistence through the Registry Run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
FatDuke has used HKLM\SOFTWARE\Microsoft\CurrentVersion\Run to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
FELIXROOT adds a shortcut file to the startup folder for persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has established persistence by using the Registry option in PowerShell Empire to add a Run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has used Windows Registry run keys such as, HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hosts to maintain persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has used Registry Run keys to establish persistence for its downloader tools known as HARDTACK and SHIPBREAD.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It malware has created Registry Run and RunOnce keys to establish persistence, and has also added items to the Startup folder.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Final1stspy creates a Registry Run key to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
FinFisher establishes persistence by creating the Registry key HKCU\Software\Microsoft\Windows\Run.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Flagpro has dropped an executable file to the startup directory.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
FLASHFLOOD achieves persistence by making an entry in the Registry's Run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
FlawedAmmyy has established persistence via the HKCU\SOFTWARE\microsoft\windows\currentversion\run registry key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
FunnyDream can use a Registry Run Key and the Startup folder to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It tools have registered Run keys in the registry to give malicious VBS files persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Gazer can establish persistence by creating a .lnk file in the Start menu.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Gelsemium can set persistence with a Registry run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
gh0st RAT has added a Registry Run key to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Gold Dragon establishes persistence in the Startup folder.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It malware can create a .lnk file and add a Registry Run key to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Grandoreiro can use run keys and create link files in the startup folder for persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
GRIFFON has used a persistence module that stores the implant inside the Registry, which executes at logon.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
GrimAgent can set persistence with a Registry run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
GuLoader can establish persistence via the Registry under HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Hancitor has added Registry Run keys to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Helminth establishes persistence by creating a shortcut in the Start Menu folder.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Heyoka Backdoor can establish persistence with the auto start function including using the value EverNoteTrayUService.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Hi-Zor creates a Registry Run key to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It added a spoofed binary to the start-up folder for persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
HTTPBrowser has established persistence by setting the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key value for wdm to the path of the executable. It has also used the Registry entry HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run vpdn "%ALLUSERPROFILE%\%APPDATA%\vpdn\VPDN_LU.exe" to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
IcedID has established persistence by creating a Registry run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has maintained persistence by modifying Registry run key value HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Some InnaputRAT variants establish persistence by modifying the Registry key HKU\\Software\Microsoft\Windows\CurrentVersion\Run:%appdata%\NeutralApp\NeutralApp.exe.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
InvisiMole can place a lnk file in the Startup Folder to achieve persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Ixeshe can achieve persistence by adding itself to the HKCU\Software\Microsoft\Windows\CurrentVersion\Run Registry key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
JCry has created payloads in the Startup directory to maintain persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
JHUHUGIT has used a Registry Run key to establish persistence by executing JavaScript code within the rundll32.exe process.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Kasidet creates a Registry Run key to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Kazuar adds a sub-key under several Registry run keys.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Several It backdoors achieved persistence by adding a Run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has placed scripts in the startup folder for persistence and modified the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Registry key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Koadic has added persistence to the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Registry key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
KOCTOPUS can set the AutoRun Registry key with a PowerShell command.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
A version of KONNI has dropped a Windows shortcut into the Startup folder to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has maintained persistence by loading malicious code into a startup folder or by adding a Registry Run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has achieved persistence via writing a PowerShell script to the autorun registry key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
LiteDuke can create persistence by adding a shortcut in the CurrentVersion\Run Registry key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
LoJax has modified the Registry key ‘HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\BootExecute’ from ‘autocheck autochk ’ to ‘autocheck autoche ’ in order to execute its payload during Windows startup.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
LookBack sets up a Registry Run key to establish a persistence mechanism.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Lucifer can persist by setting Registry key values HKLM\Software\Microsoft\Windows\CurrentVersion\Run\QQMusic and HKCU\Software\Microsoft\Windows\CurrentVersion\Run\QQMusic.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has used malicious DLLs that setup persistence in the Registry Key HKCU\Software\Microsoft\Windows\Current Version\Run.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It used the startup folder for persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It malware has used Registry Run keys to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
MarkiRAT can drop its payload into the Startup directory to ensure it automatically runs when the compromised system is started.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Matryoshka can establish persistence by adding Registry Run keys.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Maze has created a file named "startup_vrun.bat" in the Startup folder of a virtual machine to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
MCMD can use Registry Run Keys for persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Metamorfo has configured persistence to the Registry ket HKCU\Software\Microsoft\Windows\CurrentVersion\Run, Spotify =% APPDATA%\Spotify\Spotify.exe and used .LNK files in the startup folder to achieve persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Mivast creates the following Registry entry: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Micromedia.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
MoleNet can achieve persitence on the infected machine by setting the Registry run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It saved malicious files within the AppData and Startup folders to maintain persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Mongall can establish persistence with the auto start function including using the value EverNoteTrayUService.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Mosquito establishes persistence under the Registry key HKCU\Software\Run auto_update.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has added Registry Run key KCU\Software\Microsoft\Windows\CurrentVersion\Run\SystemTextEncoding to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has created the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobelmdyU to maintain persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has modified a victim's Windows Run registry to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
NanHaiShu modifies the %regrun% Registry to point itself to an autostart mechanism.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
NanoCore creates a RunOnce key in the Registry to execute its VBS scripts each time the user logs on to the machine.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
NavRAT creates a Registry key to ensure a file gets executed upon reboot in order to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Nebulae can achieve persistence through a Registry Run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
The "SCOUT" variant of NETEAGLE achieves persistence by adding itself to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
NETWIRE creates a Registry start-up entry to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
njRAT has added persistence via the Registry key HKCU\Software\Microsoft\CurrentVersion\Run\ and dropped a shortcut in %STARTUP%.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
NOKKI has established persistence by writing the payload to the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
ObliqueRAT can gain persistence by a creating a shortcut in the infected user's Startup directory.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Octopus achieved persistence by placing a malicious executable in the startup directory and has added the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run key to the Registry.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Okrum establishes persistence by creating a .lnk shortcut to itself in the Startup folder.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
During Operation Dream Job, It placed LNK files into the victims' startup folder for persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
During Operation Sharpshooter, a first-stage downloader installed Rising Sun to %Startup%\mssync.exe on a compromised host.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has added the path of its second-stage malware to the startup folder to achieve persistence. One of its file stealers has also persisted by adding a Registry Run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Pisloader establishes persistence via a Registry Run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
PLAINTEE gains persistence by adding the Registry key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
PlugX adds Run key entries in the Registry to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
PoetRAT has added a registry key in the hive for persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
PoisonIvy creates run key Registry entries pointing to a malicious executable dropped to disk.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
PowerDuke achieves persistence by using various Registry Run keys.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
PowerShower sets up persistence with a Registry run key.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.