Skip to content

osintafrica

intelligency blog

Primary Menu

osintafrica

  • Home
  • Main News
    • Security Awareness
    • Security Webcast
  • About me
  • Contact
  • Archives
  • Main News

Persistence methods used by malware

Bangaly Koita 2 years ago

Many malware used the persistence method to maintain the foothold on the system that was infected even when the system is restarted.

They are many technics often used by malware to maintain the persistency such as: registry keys, the startup folder, account manipulation, device registration and others Persistence, Tactic TA0003 – Enterprise | MITRE ATT&CK®.

Registry Keys used for persistency.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce

Startup folder used for persistency.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders

Tools used to detect and remove malware using persistence method.

  • Autoruns Autoruns for Windows – Sysinternals | Microsoft Learn
  • Sysmon Sysmon – Sysinternals | Microsoft Learn
  • Endpoint Detection and Response such as:
  • Crowdstrike CrowdStrike: Stop breaches. Drive business
  • Sophos Intercept X Endpoint https://www.sophos.com/
  • SentinelOne SentinelOne | Autonomous AI Endpoint Security Platform | s1.ai
  • Microsoft Defender Microsoft Defender for Individuals | Microsoft 365
  • PowerShell logging, PowerShell GetWmi-Object, OSQuery, Antimalware Scan Interface How to detect persistence mechanisms with seven different tools (redcanary.com)

 In conclusion, the persistence method is one of the favorites methods used by the threats actors to compromise the system. They are many malware that used the technics described above to maintain the foothold to the system. Following the best practices such as using tools to detect and remove the malware is the key to stay protected.

Bangaly Koita
Bangaly Koita

Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.

Post Navigation

Previous LE BYOD et les organisations en Afrique
Next Goldman website scamming people in Guinea-Conakry and around the world.

Recent Posts

  • How to use AbuseIPDB
  • top AI-powered threat intelligence platforms
  • Top Free sports TVs Streaming online websites
  • The top 10 most visited websites in Guinea-Conakry
  • Million of MTN Group users data available on DarkWeb by unknown threat actor

Recent Comments

No comments to show.

Categories

  • Main News
  • Security Awareness
  • Security Webcast

You may have missed

main
  • Main News

How to use AbuseIPDB

Bangaly Koita 12 hours ago
Threat Intelligence
  • Main News

top AI-powered threat intelligence platforms

Bangaly Koita 3 days ago
Sport website
  • Main News

Top Free sports TVs Streaming online websites

Bangaly Koita 2 weeks ago
websites
  • Main News

The top 10 most visited websites in Guinea-Conakry

Bangaly Koita 3 weeks ago
MTN logo
  • Main News

Million of MTN Group users data available on DarkWeb by unknown threat actor

Bangaly Koita 1 month ago
Copyright © All rights reserved. | CoverNews by AF themes.
Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}