Skip to content

osintafrica

intelligency blog

Primary Menu

osintafrica

  • Home
  • Main News
    • Security Awareness
    • Security Webcast
  • About me
  • Contact
  • Archives
  • Main News

Persistence methods used by malware

Bangaly Koita 2 years ago

Many malware used the persistence method to maintain the foothold on the system that was infected even when the system is restarted.

They are many technics often used by malware to maintain the persistency such as: registry keys, the startup folder, account manipulation, device registration and others Persistence, Tactic TA0003 – Enterprise | MITRE ATT&CK®.

Registry Keys used for persistency.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce

Startup folder used for persistency.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders

Tools used to detect and remove malware using persistence method.

  • Autoruns Autoruns for Windows – Sysinternals | Microsoft Learn
  • Sysmon Sysmon – Sysinternals | Microsoft Learn
  • Endpoint Detection and Response such as:
  • Crowdstrike CrowdStrike: Stop breaches. Drive business
  • Sophos Intercept X Endpoint https://www.sophos.com/
  • SentinelOne SentinelOne | Autonomous AI Endpoint Security Platform | s1.ai
  • Microsoft Defender Microsoft Defender for Individuals | Microsoft 365
  • PowerShell logging, PowerShell GetWmi-Object, OSQuery, Antimalware Scan Interface How to detect persistence mechanisms with seven different tools (redcanary.com)

 In conclusion, the persistence method is one of the favorites methods used by the threats actors to compromise the system. They are many malware that used the technics described above to maintain the foothold to the system. Following the best practices such as using tools to detect and remove the malware is the key to stay protected.

Bangaly Koita
Bangaly Koita

Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.

Post Navigation

Previous LE BYOD et les organisations en Afrique
Next Goldman website scamming people in Guinea-Conakry and around the world.

Recent Posts

  • Million of MTN Group users data available on DarkWeb by unknown threat actor
  • Scammers created thousand of fake websites mimicking Telegram
  • Malicious ConnectWise Control application downloaded in the wild
  • Tesla website impersonated by threat actors
  • Google Meet typosquat by threat actors

Recent Comments

No comments to show.

Categories

  • Main News
  • Security Awareness
  • Security Webcast

You may have missed

MTN logo
  • Main News

Million of MTN Group users data available on DarkWeb by unknown threat actor

Bangaly Koita 13 hours ago
Telegram phishing
  • Main News

Scammers created thousand of fake websites mimicking Telegram

Bangaly Koita 1 month ago
ConnectWise
  • Main News

Malicious ConnectWise Control application downloaded in the wild

Bangaly Koita 1 month ago
Tesla phishing
  • Main News

Tesla website impersonated by threat actors

Bangaly Koita 2 months ago
Google call
  • Main News

Google Meet typosquat by threat actors

Bangaly Koita 2 months ago
Copyright © All rights reserved. | CoverNews by AF themes.
Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}