Possibly tries to implement anti-virtualization techniquesĪdversaries may interact with the Windows Registry to hide configuration information within Registry keys, remove information as part of cleaning up, or as part of other techniques to aid in persistence and execution.Īdversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software. Modifies auto-execute functionality by setting/creating a value in the registryĪdversaries may employ various means to detect and avoid virtualization and analysis environments. Adversaries may achieve persistence by adding a program to a startup folder or referencing it with a Registry run key.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |