A Windows OS hierarchical database that stores much of the information and settings for software programs, hardware devices, user preferences, and operating-system configurations[1]
Opening a Registry Key, typically to read the associated value (ex: Windows EID 4656)
Opening a Registry Key, typically to read the associated value (ex: Windows EID 4656)
Domain | ID | Name | Detects | |
---|---|---|---|---|
Enterprise | T1003 | OS Credential Dumping |
Monitor for the SAM registry key being accessed that may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password, from the operating system and software. |
|
.002 | Security Account Manager |
Monitor for the SAM registry key dump being created to access stored account password hashes. Some hash dumpers will open the local file system as a device and parse to the SAM table to avoid file access defenses. Others will make an in-memory copy of the SAM table before reading hashes. Detection of compromised /techniques/T1078 in-use by adversaries may help as well. |
||
.004 | LSA Secrets |
Monitor for the LSA secrets are stored in the registry at |
||
Enterprise | T1012 | Query Registry |
Monitor for unexpected process interactions with the Windows Registry (i.e. reads) that may be related to gathering information. |
|
Enterprise | T1614 | .001 | System Location Discovery: System Language Discovery |
Monitor for access to windows registry keys that may attempt to gather information about the system language of a victim in order to infer the geographical location of that host. |
Enterprise | T1033 | System Owner/User Discovery |
Monitor for the SAM registry key being accessed that may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password, from the operating system and software. |
|
Enterprise | T1552 | Unsecured Credentials |
Monitor for unexpected windows registry key being accessed that may search compromised systems to find and obtain insecurely stored credentials. |
|
.002 | Credentials in Registry |
Monitor for unexpected windows registry key being accessed that may search the Registry on compromised systems for insecurely stored credentials. |
Initial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
Initial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)
Domain | ID | Name | Detects | |
---|---|---|---|---|
Enterprise | T1547 | Boot or Logon Autostart Execution |
Monitor for additions of mechanisms that could be used to trigger autostart execution, such as relevant additions to the Registry. |
|
.001 | Registry Run Keys / Startup Folder |
Monitor for newly created windows registry keys that may achieve persistence by adding a program to a startup folder or referencing it with a Registry run key. |
||
.014 | Active Setup |
Monitor Registry key additions to |
||
Enterprise | T1037 | Boot or Logon Initialization Scripts |
Monitor for newly constructed windows registry keys that may use scripts automatically executed at boot or logon initialization to establish persistence |
|
.001 | Logon Script (Windows) |
Monitor for the creation/modification to Registry keys associated with Windows logon scrips, nameley |
||
Enterprise | T1176 | Browser Extensions |
Monitor for any new items written to the Registry or PE files written to disk. That may correlate with browser extension installation. |
|
Enterprise | T1543 | Create or Modify System Process |
Monitor for newly constructed windows registry keys that may create or modify system-level processes to repeatedly execute malicious payloads as part of persistence. |
|
.003 | Windows Service |
Monitor for new constructed windows registry keys that may create or modify Windows services to repeatedly execute malicious payloads as part of persistence. |
||
Enterprise | T1562 | .002 | Impair Defenses: Disable Windows Event Logging |
Monitor the addition of the MiniNT registry key in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control, which may disable Event Viewer.[3] |
.009 | Impair Defenses: Safe Mode Boot |
Monitor Registry creation for services that may start on safe mode. For example, a program can be forced to start on safe mode boot by adding a |
||
Enterprise | T1112 | Modify Registry |
Monitor for newly constructed registry keys or values to aid in persistence and execution. |
|
Enterprise | T1137 | Office Application Startup |
Many Office-related persistence mechanisms require changes to the Registry and for binaries, files, or scripts to be written to disk or existing files modified to include malicious scripts. Collect events related to Registry key creation and modification for keys that could be used for Office-based persistence.[6][7] |
|
.001 | Office Template Macros |
Collect events related to Registry key creation for keys that could be used for Office-based persistence.[6][7] |
||
.002 | Office Test |
Monitor for the creation of the Office Test Registry key. Collect events related to Registry key creation for keys that could be used for Office-based persistence. Since v13.52, Autoruns can detect tasks set up using the Office Test Registry key.[8] |
||
.006 | Add-ins |
Audit the Registry entries relevant for enabling add-ins.[9][10] |
||
Enterprise | T1553 | Subvert Trust Controls |
Monitoring the creation of (sub)keys within the Windows Registry may reveal malicious attempts to modify trust settings, such as the installation of root certificates. Installed root certificates are located in the Registry under |
|
.004 | Install Root Certificate |
Monitoring the creation of (sub)keys within the Windows Registry may reveal malicious root certificate installation. Installed root certificates are located in the Registry under |
Removal of a Registry Key (ex: Windows EID 4658 or Sysmon EID 12)
Removal of a Registry Key (ex: Windows EID 4658 or Sysmon EID 12)
Domain | ID | Name | Detects | |
---|---|---|---|---|
Enterprise | T1562 | Impair Defenses |
Monitor for unexpected deletion of windows registry keys that that may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. |
|
.001 | Disable or Modify Tools |
Monitor for deletion of Windows Registry keys and/or values related to services and startup programs that correspond to security tools such as HKLM:\SOFTWARE\Microsoft\AMSI\Providers. |
||
Enterprise | T1070 | Indicator Removal on Host |
Monitor windows registry keys that may be deleted or alter generated artifacts on a host system, including logs or captured files such as quarantined malware. |
|
Enterprise | T1112 | Modify Registry |
Monitor for unexpected deletion of windows registry keys to hide configuration information, remove information as part of cleaning up, or as part of other techniques to aid in persistence and execution. |
Changes made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
Changes made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)
Domain | ID | Name | Detects | |
---|---|---|---|---|
Enterprise | T1548 | Abuse Elevation Control Mechanism |
There are many ways to perform UAC bypasses when a user is in the local administrator group on a system, so it may be difficult to target detection on all variations. Efforts should likely be placed on mitigation and collecting enough information on process launches and actions that could be performed before and after a UAC bypass is performed. Some UAC bypass methods rely on modifying specific, user-accessible Registry settings. Analysts should monitor Registry settings for unauthorized changes. |
|
.002 | Bypass User Account Control |
Some UAC bypass methods rely on modifying specific, user-accessible Registry settings. For example: The |
||
Enterprise | T1557 | Adversary-in-the-Middle |
Monitor HKLM\Software\Policies\Microsoft\Windows NT\DNSClient for changes to the "EnableMulticast" DWORD value. A value of "0" indicates LLMNR is disabled. |
|
.001 | LLMNR/NBT-NS Poisoning and SMB Relay |
Monitor HKLM\Software\Policies\Microsoft\Windows NT\DNSClient for changes to the "EnableMulticast" DWORD value. A value of "0" indicates LLMNR is disabled. |
||
Enterprise | T1547 | Boot or Logon Autostart Execution |
Monitor for modifications of mechanisms that could be used to trigger autostart execution, such as relevant additions to the Registry. |
|
.001 | Registry Run Keys / Startup Folder |
Monitor Registry for changes to run keys that do not correlate with known software, patch cycles, etc. Tools such as Sysinternals Autoruns may also be used to detect system changes that could be attempts at persistence, including listing the run keys' Registry locations. [2] |
||
.002 | Authentication Package |
Monitor the Registry for changes to the LSA Registry keys. Windows 8.1 and Windows Server 2012 R2 may generate events when unsigned DLLs try to load into the LSA by setting the Registry key |
||
.003 | Time Providers |
Monitor for changes made to windows registry keys and/or values modifying W32Time information in the Registry. |
||
.004 | Winlogon Helper DLL |
Monitor for changes to Registry entries associated with Winlogon that do not correlate with known software, patch cycles, etc. Tools such as Sysinternals Autoruns may also be used to detect system changes that could be attempts at persistence, including listing current Winlogon helper values. [2] |
||
.005 | Security Support Provider |
Monitor the Registry for changes to the SSP Registry keys. Windows 8.1 and Windows Server 2012 R2 may generate events when unsigned SSP DLLs try to load into the LSA by setting the Registry key |
||
.010 | Port Monitors |
Monitor Registry writes to |
||
.012 | Print Processors |
Monitor Registry writes to |
||
.014 | Active Setup |
Monitor Registry key modifications to |
||
Enterprise | T1543 | Create or Modify System Process |
Monitor for changes to windows registry keys and/or values that may create or modify system-level processes to repeatedly execute malicious payloads as part of persistence. |
|
.003 | Windows Service |
Look for changes to service Registry entries that do not correlate with known software, patch cycles, etc. Service information is stored in the Registry at |
||
Enterprise | T1074 | Data Staged |
Consider monitoring accesses and modifications to local storage repositories (such as the Windows Registry), especially from suspicious processes that could be related to malicious data collection. |
|
.001 | Local Data Staging |
Consider monitoring accesses and modifications to local storage repositories (such as the Windows Registry), especially from suspicious processes that could be related to malicious data collection. |
||
Enterprise | T1546 | Event Triggered Execution |
Monitor for changes made to windows registry keys and/or values that may establish persistence and/or elevate privileges using system mechanisms that trigger execution based on specific events. |
|
.001 | Change Default File Association |
Collect and analyze changes to Registry keys that associate file extensions to default applications for execution and correlate with unknown process launch activity or unusual file types for that process. User file association preferences are stored under |
||
.002 | Screensaver |
Monitor changes to screensaver configuration changes in the Registry that may not correlate with typical user behavior. Tools such as Sysinternals Autoruns can be used to detect changes to the screensaver binary path in the Registry. |
||
.007 | Netsh Helper DLL |
Monitor the |
||
.008 | Accessibility Features |
Monitor Registry keys within |
||
.009 | AppCert DLLs |
Monitor the AppCertDLLs Registry value for modifications that do not correlate with known software, patch cycles, etc. |
||
.010 | AppInit DLLs |
Monitor the AppInit_DLLs Registry values for modifications that do not correlate with known software, patch cycles, etc. |
||
.011 | Application Shimming |
Monitor for changes to windows registry keys and/or values that may establish persistence and/or elevate privileges by executing malicious content triggered by application shims. |
||
.012 | Image File Execution Options Injection |
Monitor Registry values associated with IFEOs, as well as silent process exit monitoring, for modifications that do not correlate with known software, patch cycles, etc. |
||
.015 | Component Object Model Hijacking |
There are opportunities to detect COM hijacking by searching for Registry references that have been replaced and through Registry operations (ex: Reg) replacing known binary paths with unknown paths or otherwise malicious content. Even though some third-party applications define user COM objects, the presence of objects within HKEY_CURRENT_USER\Software\Classes\CLSID\ may be anomalous and should be investigated since user objects will be loaded prior to machine objects in HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID.[18] Registry entries for existing COM objects may change infrequently. When an entry with a known good path and binary is replaced or changed to an unusual value to point to an unknown binary in a new location, then it may indicate suspicious behavior and should be investigated. |
||
Enterprise | T1564 | Hide Artifacts |
Monitor for changes made to windows registry keys and/or values that may attempt to hide artifacts associated with their behaviors to evade detection. |
|
.002 | Hidden Users |
Monitor for changes made to windows registry key or values for unexpected modifications of the |
||
.005 | Hidden File System |
Monitor for changes made to windows registry keys and/or values that may use a hidden file system to conceal malicious activity from users and security tools. |
||
.006 | Run Virtual Instance |
Monitor for changes made to Windows Registry keys and/or values that may be the result of using a virtual instance to avoid detection. For example, if virtualization software is installed by the adversary the Registry may provide detection opportunities. |
||
Enterprise | T1574 | Hijack Execution Flow |
Monitor for changes made to windows registry keys and/or values that may execute their own malicious payloads by hijacking the way operating systems run programs. |
|
.007 | Path Interception by PATH Environment Variable |
Monitor for modifications of PATH environment variable Registry keys such as |
||
.011 | Services Registry Permissions Weakness |
Monitor for modification of Registry keys and values used by services such as HKLM\SYSTEM\CurrentControlSet\Services that may allow adversaries to launch their own code when a service starts. |
||
.012 | COR_PROFILER |
For detecting system and user scope abuse of the COR_PROFILER variable, monitor the Registry for changes to COR_ENABLE_PROFILING, COR_PROFILER, and COR_PROFILER_PATH that correspond to system and user environment variables that do not correlate to known developer tools. |
||
Enterprise | T1562 | Impair Defenses |
Monitor Registry edits for modifications to services and startup programs that correspond to security tools. |
|
.001 | Disable or Modify Tools |
Monitor for changes made to Windows Registry keys and/or values related to services and startup programs that correspond to security tools such as HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender. |
||
.004 | Disable or Modify System Firewall |
Monitor for changes made to windows Registry keys and/or values that adversaries might use to disable or modify System Firewall settings such as HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy. |
||
.006 | Indicator Blocking |
To detect changes in ETW you can also monitor the registry key which contains configurations for all ETW event providers: |
||
.009 | Safe Mode Boot |
Monitor modifications to Registry data associated with enabling safe mode. For example, a service can be forced to start on safe mode boot by adding a |
||
Enterprise | T1070 | Indicator Removal on Host |
Monitor for changes made to windows registry keys or values that may delete or alter generated artifacts on a host system, including logs or captured files such as quarantined malware. |
|
Enterprise | T1490 | Inhibit System Recovery |
Monitor the registry for changes associated with system recovery features (ex: the creation of |
|
Enterprise | T1056 | Input Capture |
Monitor for changes made to windows registry keys or values for unexpected modifications |
|
.001 | Keylogging |
Monitor for changes made to windows registry keys or values for unexpected modifications |
||
Enterprise | T1556 | Modify Authentication Process |
Monitor for changes to Registry entries for password filters (ex: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Notification Packages) and correlate then investigate the DLL files these files reference. |
|
.002 | Password Filter DLL |
Monitor for changes to Registry entries for password filters (ex: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Notification Packages) and correlate then investigate the DLL files these files reference. |
||
Enterprise | T1112 | Modify Registry |
Monitor for changes made to windows registry keys or values. Consider enabling Registry Auditing on specific keys to produce an alertable event (Event ID 4657) whenever a value is changed (though this may not trigger when values are created with Reghide or other evasive methods). [19] Changes to Registry entries that load software on Windows startup that do not correlate with known software, patch cycles, etc., are suspicious, as are additions or changes to files within the startup folder. Changes could also include new services and modification of existing binary paths to point to malicious files. If a change to a service-related entry occurs, then it will likely be followed by a local or remote service start or restart to execute the file. |
|
Enterprise | T1111 | Multi-Factor Authentication Interception |
Monitor for changes to windows registry keys or values that may target multi-factor authentication mechanisms, such as smart cards, to gain access to credentials that can be used to access systems, services, and network resources. |
|
Enterprise | T1137 | Office Application Startup |
Many Office-related persistence mechanisms require changes to the Registry and for binaries, files, or scripts to be written to disk or existing files modified to include malicious scripts. Collect events related to Registry key creation and modification for keys that could be used for Office-based persistence.[6][7] |
|
.001 | Office Template Macros |
Collect events related to Registry key modification for keys that could be used for Office-based persistence.[6][7] |
||
.002 | Office Test |
Monitor for changes made to the Office Test Registry key. Collect events related to Registry key modification for keys that could be used for Office-based persistence. Since v13.52, Autoruns can detect tasks set up using the Office Test Registry key.[8] |
||
.006 | Add-ins |
Audit the Registry entries relevant for enabling add-ins.[9][10] |
||
Enterprise | T1505 | .005 | Server Software Component: Terminal Services DLL |
Monitor for changes to Registry keys associated with |
Enterprise | T1489 | Service Stop |
Monitor for changes made to windows registry keys and/or values that may stop or disable services on a system to render those services unavailable to legitimate users. |
|
Enterprise | T1553 | Subvert Trust Controls |
Monitoring changes to the Windows Registry may reveal malicious attempts to modify trust settings, such as the installation of root certificates. Installed root certificates are located in the Registry under |
|
.003 | SIP and Trust Provider Hijacking |
Enable the Registry Global Object Access Auditing [20] setting in the Advanced Security Audit policy to apply a global system access control list (SACL) and event auditing on modifications to Registry values (sub)keys related to SIPs and trust providers:[21] Note: As part of this technique, adversaries may attempt to manually edit these Registry keys (ex: Regedit) or utilize the legitimate registration process using Regsvr32.[22] Periodically baseline registered SIPs and trust providers (Registry entries and files on disk), specifically looking for new, modified, or non-Microsoft entries.[22] |
||
.004 | Install Root Certificate |
Monitoring changes to the Windows Registry may reveal malicious root certificate installation. Installed root certificates are located in the Registry under |
||
.006 | Code Signing Policy Modification |
Consider monitoring for modifications made to Registry keys associated with code signing policies, such as |
||
Enterprise | T1218 | System Binary Proxy Execution |
Monitor for changes made to Windows Registry keys and/or values that may forge credential materials that can be used to gain access to web applications or Internet services. |
|
.002 | Control Panel |
Inventory Control Panel items to locate unregistered and potentially malicious files present on systems: Executable format registered Control Panel items will have a globally unique identifier (GUID) and registration Registry entries in |
||
Enterprise | T1569 | System Services |
Monitor for changes made to windows registry keys and/or values that may abuse system services or daemons to execute commands or programs. |
|
.002 | Service Execution |
Monitor for changes made to windows registry keys and/or values that may abuse the Windows service control manager to execute malicious commands or payloads. |