Skip to content

Latest commit

 

History

History
82 lines (61 loc) · 4.89 KB

registry-run-keys-startup-folder.md

File metadata and controls

82 lines (61 loc) · 4.89 KB
ID F0012
Objective(s) Persistence
Related ATT&CK Techniques Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder (T1547.001)
Version 2.0
Created 2 August 2022
Last Modified 21 November 2022

Registry Run Keys / Startup Folder

Malware may add an entry to the Windows Registry run keys or startup folder to enable persistence. [1]

See ATT&CK: Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder (T1547.001).

Use in Malware

Name Date Method Description
TrickBot 2016 -- Trojan spyware program that has mainly been used for targeting banking sites.
Poison-Ivy 2005 -- After the Poison-Ivy server is running on the target machine, the attacker can use a Windows GUI client to control the target computer. [2]
Hupigon 2013 -- Hupigon drops the file "Systen.dll" and adds the registry entry: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\BITS DllName = "%System%\Systen.dll". [3]
Terminator May 2013 -- The Terminator rat sets "2019" as Windows' startup folder by modifying a registry value. [4]
CryptoLocker 2013 -- The malware creates an "autorun" registry key [5]
GotBotKR 2019 -- GoBotKR installs itself under registry run keys to establish persistence. [6]
Kovter 2016 -- The malware writes an autorun registry entry [7]
Rombertik 2015 -- The malware will proceed to install itself in order to ensure persistence across system reboots before continuing on to execute the payload. To install itself, Rombertik first creates a VBS script named “fgf.vbs”, which is used to kick off Rombertik every time the user logs in, and places the script into the user’s Startup folder. [8]
Ursnif 2016 -- Adds registry entries to ensure automatic execution at every system startup [9]
BlackEnergy 2007 -- BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder [10]
Conficker 2008 -- To start itself at system boot, the virus saces a copy of its DLL form to a random filename in the Windows system folder, then adds registry keys to have svchost.exe invoke that DLL as an invisible network service [11]
DarkComet 2008 -- adds several registry entries to enable automatic execution at startup [12]
Emotet 2018 -- To start itself at system boot, Emotet adds the downloaded payload to the registry to maintain persistence [13]
Bagle 2004 -- Adds registry keys to enable its automatic execution at every system startup [14]

References

[1] https://threatvector.cylance.com/en_us/home/windows-registry-persistence-part-2-the-run-keys-and-search-order.html

[2] https://www.cyber.nj.gov/threat-profiles/trojan-variants/poison-ivy

[3] https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/HUPIGON

[4] https://www.fireeye.com/content/dam/fireeye-www/current-threats/pdfs/pf/file/fireeye-hot-knives-through-butter.pdf

[5] https://www.secureworks.com/research/cryptolocker-ransomware

[6] https://www.welivesecurity.com/2019/07/08/south-korean-users-backdoor-torrents/

[7] https://blog.malwarebytes.com/threat-analysis/2016/07/untangling-kovter/

[8] https://blogs.cisco.com/security/talos/rombertik

[9] https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/PE_URSNIF.A2?_ga=2.131425807.1462021705.1559742358-1202584019.1549394279

[10] https://blog-assets.f-secure.com/wp-content/uploads/2019/10/15163408/BlackEnergy_Quedagh.pdf

[11] https://en.wikipedia.org/wiki/Conficker

[12] https://blog.malwarebytes.com/threat-analysis/2012/06/you-dirty-rat-part-1-darkcomet/

[13] https://cofense.com/recent-geodo-malware-campaigns-feature-heavily-obfuscated-macros/

[14] https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/WORM_BAGLE.U/