prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Boot or Logon Autostart Execution:Registry Run Keys
|
EVILNUM can achieve persistence through the Registry Run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
FatDuke has used HKLM\SOFTWARE\Microsoft\CurrentVersion\Run to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
FELIXROOT adds a shortcut file to the startup folder for persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has established persistence by using the Registry option in PowerShell Empire to add a Run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has used Windows Registry run keys such as, HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hosts to maintain persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has used Registry Run keys to establish persistence for its downloader tools known as HARDTACK and SHIPBREAD.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It malware has created Registry Run and RunOnce keys to establish persistence, and has also added items to the Startup folder.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Final1stspy creates a Registry Run key to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
FinFisher establishes persistence by creating the Registry key HKCU\Software\Microsoft\Windows\Run.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Flagpro has dropped an executable file to the startup directory.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
FLASHFLOOD achieves persistence by making an entry in the Registry's Run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
FlawedAmmyy has established persistence via the HKCU\SOFTWARE\microsoft\windows\currentversion\run registry key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
FunnyDream can use a Registry Run Key and the Startup folder to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It tools have registered Run keys in the registry to give malicious VBS files persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Gazer can establish persistence by creating a .lnk file in the Start menu.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Gelsemium can set persistence with a Registry run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
gh0st RAT has added a Registry Run key to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Gold Dragon establishes persistence in the Startup folder.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It malware can create a .lnk file and add a Registry Run key to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Grandoreiro can use run keys and create link files in the startup folder for persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
GRIFFON has used a persistence module that stores the implant inside the Registry, which executes at logon.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
GrimAgent can set persistence with a Registry run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
GuLoader can establish persistence via the Registry under HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Hancitor has added Registry Run keys to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Helminth establishes persistence by creating a shortcut in the Start Menu folder.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Heyoka Backdoor can establish persistence with the auto start function including using the value EverNoteTrayUService.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Hi-Zor creates a Registry Run key to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It added a spoofed binary to the start-up folder for persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
HTTPBrowser has established persistence by setting the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key value for wdm to the path of the executable. It has also used the Registry entry HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run vpdn "%ALLUSERPROFILE%\%APPDATA%\vpdn\VPDN_LU.exe" to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
IcedID has established persistence by creating a Registry run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has maintained persistence by modifying Registry run key value HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Some InnaputRAT variants establish persistence by modifying the Registry key HKU\\Software\Microsoft\Windows\CurrentVersion\Run:%appdata%\NeutralApp\NeutralApp.exe.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
InvisiMole can place a lnk file in the Startup Folder to achieve persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Ixeshe can achieve persistence by adding itself to the HKCU\Software\Microsoft\Windows\CurrentVersion\Run Registry key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
JCry has created payloads in the Startup directory to maintain persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
JHUHUGIT has used a Registry Run key to establish persistence by executing JavaScript code within the rundll32.exe process.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Kasidet creates a Registry Run key to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Kazuar adds a sub-key under several Registry run keys.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Several It backdoors achieved persistence by adding a Run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has placed scripts in the startup folder for persistence and modified the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Registry key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Koadic has added persistence to the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Registry key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
KOCTOPUS can set the AutoRun Registry key with a PowerShell command.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
A version of KONNI has dropped a Windows shortcut into the Startup folder to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has maintained persistence by loading malicious code into a startup folder or by adding a Registry Run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has achieved persistence via writing a PowerShell script to the autorun registry key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
LiteDuke can create persistence by adding a shortcut in the CurrentVersion\Run Registry key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
LoJax has modified the Registry key ‘HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\BootExecute’ from ‘autocheck autochk ’ to ‘autocheck autoche ’ in order to execute its payload during Windows startup.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
LookBack sets up a Registry Run key to establish a persistence mechanism.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Lucifer can persist by setting Registry key values HKLM\Software\Microsoft\Windows\CurrentVersion\Run\QQMusic and HKCU\Software\Microsoft\Windows\CurrentVersion\Run\QQMusic.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has used malicious DLLs that setup persistence in the Registry Key HKCU\Software\Microsoft\Windows\Current Version\Run.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It used the startup folder for persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It malware has used Registry Run keys to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
MarkiRAT can drop its payload into the Startup directory to ensure it automatically runs when the compromised system is started.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Matryoshka can establish persistence by adding Registry Run keys.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Maze has created a file named "startup_vrun.bat" in the Startup folder of a virtual machine to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
MCMD can use Registry Run Keys for persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Metamorfo has configured persistence to the Registry ket HKCU\Software\Microsoft\Windows\CurrentVersion\Run, Spotify =% APPDATA%\Spotify\Spotify.exe and used .LNK files in the startup folder to achieve persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Mivast creates the following Registry entry: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Micromedia.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
MoleNet can achieve persitence on the infected machine by setting the Registry run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It saved malicious files within the AppData and Startup folders to maintain persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Mongall can establish persistence with the auto start function including using the value EverNoteTrayUService.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Mosquito establishes persistence under the Registry key HKCU\Software\Run auto_update.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has added Registry Run key KCU\Software\Microsoft\Windows\CurrentVersion\Run\SystemTextEncoding to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has created the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobelmdyU to maintain persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has modified a victim's Windows Run registry to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
NanHaiShu modifies the %regrun% Registry to point itself to an autostart mechanism.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
NanoCore creates a RunOnce key in the Registry to execute its VBS scripts each time the user logs on to the machine.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
NavRAT creates a Registry key to ensure a file gets executed upon reboot in order to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Nebulae can achieve persistence through a Registry Run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
The "SCOUT" variant of NETEAGLE achieves persistence by adding itself to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
NETWIRE creates a Registry start-up entry to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
njRAT has added persistence via the Registry key HKCU\Software\Microsoft\CurrentVersion\Run\ and dropped a shortcut in %STARTUP%.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
NOKKI has established persistence by writing the payload to the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
ObliqueRAT can gain persistence by a creating a shortcut in the infected user's Startup directory.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Octopus achieved persistence by placing a malicious executable in the startup directory and has added the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run key to the Registry.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Okrum establishes persistence by creating a .lnk shortcut to itself in the Startup folder.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
During Operation Dream Job, It placed LNK files into the victims' startup folder for persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
During Operation Sharpshooter, a first-stage downloader installed Rising Sun to %Startup%\mssync.exe on a compromised host.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has added the path of its second-stage malware to the startup folder to achieve persistence. One of its file stealers has also persisted by adding a Registry Run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Pisloader establishes persistence via a Registry Run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
PLAINTEE gains persistence by adding the Registry key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
PlugX adds Run key entries in the Registry to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
PoetRAT has added a registry key in the hive for persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
PoisonIvy creates run key Registry entries pointing to a malicious executable dropped to disk.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
PowerDuke achieves persistence by using various Registry Run keys.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
PowerShower sets up persistence with a Registry run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
POWERSOURCE achieves persistence by setting a Registry Run key, with the path depending on whether the victim account has user or administrator access.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
PowerSploit's New-UserPersistenceOption Persistence argument can be used to establish via the HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
POWERTON can install a Registry Run key for persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Prikormka adds itself to a Registry Run key with the name guidVGA or guidVSA.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
It has used Registry run keys to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Pteranodon copies itself to the Startup folder to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
PUNCHBUGGY has been observed using a Registry Run key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Pupy adds itself to the startup folder or adds itself to the Registry key SOFTWARE\Microsoft\Windows\CurrentVersion\Run for persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
A dropper used by It installs itself into the ASEP Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run with a value named McUpdate.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
QakBot can maintain persistence by creating an auto-run Registry key.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
If the QuasarRAT client process does not have administrator privileges it will add a registry key to HKCU\Software\Microsoft\Windows\CurrentVersion\Run for persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
Ramsay has created Registry Run keys to establish persistence.
|
Boot or Logon Autostart Execution:Registry Run Keys
|
RCSession has the ability to modify a Registry Run key to establish persistence.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.