Modify Registry
Adversaries may interact with the Windows Registry as part of a variety of other techniques to aid in defense evasion, persistence, and execution. Access to specific areas of the Registry depends on account permissions, with some keys requiring administrator-level access. The built-in Windows command-line utility [Reg](https://attack.mitre.org/software/S0075) may be used for local or remote Registry modification.(Citation: Microsoft Reg) Other tools, such as remote access tools, may also contai...
BY SOURCE
PROCEDURES (53)
Auto-extracted: 19 detections for persist
Auto-extracted: 18 detections for registry
Auto-extracted: 15 detections for registry monitoring
Auto-extracted: 12 detections for bypass
Auto-extracted: 9 detections for ransomware
Auto-extracted: 9 detections for privilege
Auto-extracted: 8 detections for service
Auto-extracted: 8 detections for exfiltrat
Auto-extracted: 7 detections for registry
Auto-extracted: 7 detections for tamper
Auto-extracted: 6 detections for evasion
Auto-extracted: 5 detections for remote
Auto-extracted: 5 detections for suspicious
Auto-extracted: 5 detections for macro
Auto-extracted: 4 detections for lateral
Auto-extracted: 4 detections for credential
Auto-extracted: 4 detections for startup
Auto-extracted: 3 detections for powershell
Auto-extracted: 3 detections for event log
Auto-extracted: 3 detections for unusual
Auto-extracted: 2 detections for dump
Auto-extracted: 2 detections for encrypt
Auto-extracted: 2 detections for suspicious
Auto-extracted: 2 detections for process creation monitoring
Auto-extracted: 2 detections for dns
Auto-extracted: 2 detections for script block
Auto-extracted: 2 detections for http
Auto-extracted: 2 detections for command and control
Auto-extracted: 2 detections for email
Auto-extracted: 2 detections for office
Auto-extracted: 1 detections for driver
Auto-extracted: 1 detections for dns
Auto-extracted: 1 detections for lsass
Auto-extracted: 1 detections for lsass
Auto-extracted: 1 detections for dump
Auto-extracted: 1 detections for wmi
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for tamper
Auto-extracted: 1 detections for wmi
Auto-extracted: 1 detections for powershell
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for inject
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for event log
Auto-extracted: 1 detections for driver
Auto-extracted: 1 detections for tamper
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for encrypt
Auto-extracted: 1 detections for c2
Auto-extracted: 1 detections for inject
Auto-extracted: 1 detections for unusual