Skip to content

Latest commit

 

History

History
103 lines (75 loc) · 6.29 KB

registry-run-keys-startup-folder.md

File metadata and controls

103 lines (75 loc) · 6.29 KB
ID F0012
Objective(s) Persistence
Related ATT&CK Techniques Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder (T1547.001)
Version 2.1
Created 2 August 2022
Last Modified 13 September 2023

Registry Run Keys / Startup Folder

Malware may add an entry to the Windows Registry run keys or startup folder to enable persistence. [1]

See ATT&CK: Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder (T1547.001).

Use in Malware

Name Date Method Description
TrickBot 2016 -- The malware has an auto-start service that allows it to run whenever the machine boots. [16]
Poison Ivy 2005 -- To start itself at system boot, Poison Ivy adds registry entries. [2]
Hupigon 2013 -- Hupigon drops the file "Systen.dll" and adds the registry entry: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\BITS DllName = "%System%\Systen.dll". [3]
Hupigon 2013 -- Hupigon persists via Run registry key. [3]
Terminator 2013 -- The Terminator RAT sets "2019" as Windows' startup folder by modifying a registry value. [4]
CryptoLocker 2013 -- The malware creates an "autorun" registry key. [5]
GoBotKR 2019 -- GoBotKR installs itself under registry run keys to establish persistence. [6]
Kovter 2016 -- The malware writes an autorun registry entry. [7]
Rombertik 2015 -- The malware will proceed to install itself in order to ensure persistence across system reboots before continuing on to execute the payload. To install itself, Rombertik first creates a VBS script named “fgf.vbs”, which is used to kick off Rombertik every time the user logs in, and places the script into the user’s Startup folder. [8]
Ursnif 2016 -- The malware adds registry entries to ensure automatic execution at system startup. [9]
BlackEnergy 2007 -- BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder, allowing it to persist via a Run registry key. [10] [17]
Conficker 2008 -- To start itself at system boot, the virus saves a copy of its DLL form to a random filename in the Windows system folder, then adds registry keys to have svchost.exe invoke that DLL as an invisible network service. [11]
DarkComet 2008 -- DarkComet adds several registry entries to enable automatic execution at startup. [12]
Emotet 2018 -- To start itself at system boot, Emotet adds the downloaded payload to the registry to maintain persistence. [13]
Bagle 2004 -- Bagle adds registry keys to enable its automatic execution at every system startup. [14]
Vobfus 2016 -- Malware adds registry keys to enable startup after reboot. [15]
Redhip 2011 -- Redhip persists via a Run registry key. [17]
WannaCry 2017 -- WannaCry creates two registry run keys to ensure persistence. [18]
CryptoWall A copy of Crytowall is placed in the startup folder and a directory at the root of the system drive. Also adds multiple "autostart" registry keys. [19]

Detection

Tool: capa Mapping APIs
persist via Run registry key Registry Run Keys / Startup Folder (F0012)

References

[1] https://threatvector.cylance.com/en_us/home/windows-registry-persistence-part-2-the-run-keys-and-search-order.html

[2] https://www.cyber.nj.gov/threat-center/threat-profiles/trojan-variants/poison-ivy

[3] https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/HUPIGON

[4] https://www.fireeye.com/content/dam/fireeye-www/current-threats/pdfs/pf/file/fireeye-hot-knives-through-butter.pdf

[5] https://www.secureworks.com/research/cryptolocker-ransomware

[6] https://www.welivesecurity.com/2019/07/08/south-korean-users-backdoor-torrents/

[7] https://blog.malwarebytes.com/threat-analysis/2016/07/untangling-kovter/

[8] https://blogs.cisco.com/security/talos/rombertik

[9] https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/PE_URSNIF.A2?_ga=2.131425807.1462021705.1559742358-1202584019.1549394279

[10] https://blog-assets.f-secure.com/wp-content/uploads/2019/10/15163408/BlackEnergy_Quedagh.pdf

[11] https://en.wikipedia.org/wiki/Conficker

[12] https://blog.malwarebytes.com/threat-analysis/2012/06/you-dirty-rat-part-1-darkcomet/

[13] https://cofense.com/blog/recent-geodo-malware-campaigns-feature-heavily-obfuscated-macros/

[14] https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/WORM_BAGLE.U/

[15] https://securitynews.sonicwall.com/xmlpost/revisiting-vobfus-worm-mar-8-2013/

[16] https://www.trendmicro.com/en_us/research/18/k/trickbot-shows-off-new-trick-password-grabber-module.html

[17] capa v4.0, analyzed at MITRE on 10/12/2022

[18] https://www.mandiant.com/resources/blog/wannacry-malware-profile

[19] https://www.secureworks.com/research/cryptowall-ransomware