Description
Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software. The Registry contains a significant amount of information about the operating system, configuration, software, and security.(Citation: Wikipedia Windows Registry) Information can easily be queried using the [Reg](https://attack.mitre.org/software/S0075) utility, though other means to access the Registry exist. Some of the information may help adversaries to further their operation within a network. Adversaries may use the information from [Query Registry](https://attack.mitre.org/techniques/T1012) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
Threat-Mapped Scoring
ATT&CK Kill Chain Metadata
- Tactics: discovery
- Platforms: Windows
-
Detection Guidance:
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Interaction with the Windows Registry may come from the command line using utilities such as [Reg](https://attack.mitre.org/software/S0075) or through running malware that may interact with the Registry through an API. Command-line invocation of utilities used to query the Registry may be detected through process and command-line monitoring. Remote access tools with built-in features may interact directly with the Windows API to gather information. Information may also be acquired through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).
Malware
- ADVSTORESHELL
- Attor
- Azorult
- BACKSPACE
- BabyShark
- Bankshot
- Bazar
- BendyBear
- Bisonal
- BitPaymer
- BlackByte Ransomware
- Brave Prince
- Bumblebee
- CHOPSTICK
- Carbanak
- Carberp
- Carbon
- Cardinal RAT
- CharmPower
- Clambling
- Cobalt Strike
- ComRAT
- Crimson
- DUSTTRAP
- DarkWatchman
- Denis
- Derusbi
- DownPaper
- Dtrack
- Epic
- FELIXROOT
- FatDuke
- FinFisher
- FunnyDream
- Gelsemium
- Gold Dragon
- HOPLIGHT
- Hydraq
- Industroyer
- InvisiMole
- JPIN
- Kapeka
- LiteDuke
- LitePower
- Lucifer
- Mafalda
- Milan
- Mori
- OSInfo
- POWERSOURCE
- POWRUNER
- Pillowmint
- PlugX
- Proxysvc
- QUADAGENT
- QUIETCANARY
- RATANKBA
- REvil
- ROKRAT
- Raccoon Stealer
- Reaver
- Rising Sun
- SUNBURST
- SVCReady
- Saint Bot
- Samurai
- Shamoon
- Shark
- Sibot
- SodaMaster
- StoneDrill
- Stuxnet
- SynAck
- TEARDROP
- TRANSLATEXT
- Taidoor
- TinyTurla
- Uroburos
- Ursnif
- Valak
- Volgmer
- WINDSHIELD
- WastedLocker
- Waterbear
- Woody RAT
- Zebrocy
- Zeus Panda
- ZxShell
- ZxxZ
- gh0st RAT
- njRAT