<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>device registration - osintafrica</title>
	<atom:link href="https://www.osintafrica.net/tag/device-registration/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osintafrica.net</link>
	<description>intelligency blog</description>
	<lastBuildDate>Tue, 19 Sep 2023 20:49:25 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=32%2C32&#038;ssl=1</url>
	<title>device registration - osintafrica</title>
	<link>https://www.osintafrica.net</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">221010672</site>	<item>
		<title>Persistence methods used by malware</title>
		<link>https://www.osintafrica.net/persistence-methods-used-by-malware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=persistence-methods-used-by-malware</link>
		
		<dc:creator><![CDATA[Bangaly Koita]]></dc:creator>
		<pubDate>Thu, 19 Jan 2023 17:17:59 +0000</pubDate>
				<category><![CDATA[Main News]]></category>
		<category><![CDATA[account manipulation]]></category>
		<category><![CDATA[detect and remove malware]]></category>
		<category><![CDATA[device registration]]></category>
		<category><![CDATA[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]]></category>
		<category><![CDATA[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce]]></category>
		<category><![CDATA[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]]></category>
		<category><![CDATA[Persistence methods]]></category>
		<category><![CDATA[Persistence methods used by malware]]></category>
		<category><![CDATA[registry keys]]></category>
		<category><![CDATA[the startup folder]]></category>
		<guid isPermaLink="false">https://www.osintafrica.net/?p=506</guid>

					<description><![CDATA[<p>Many malware used the persistence method to maintain the foothold on the system that was...</p>
<p>The post <a href="https://www.osintafrica.net/persistence-methods-used-by-malware/">Persistence methods used by malware</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><span style="color: #000000;">Many malware used the persistence method to maintain the foothold on the system that was infected even when the system is restarted.</span></p>
<p><span style="color: #000000;">They are many technics often used by malware to maintain the persistency such as: registry keys, the startup folder, account manipulation, device registration and others <span style="color: #0000ff;"><a style="color: #0000ff;" href="https://attack.mitre.org/tactics/TA0003/">Persistence, Tactic TA0003 &#8211; Enterprise | MITRE ATT&amp;CK®</a>.</span></span></p>
<p><span style="color: #000000;"><strong>Registry Keys used for </strong></span><span style="color: #000000;"><b>persistency.</b></span></p>
<p><span style="color: #000000;">HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run</span></p>
<p><span style="color: #000000;">HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce</span></p>
<p><span style="color: #000000;">HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run</span></p>
<p><span style="color: #000000;">HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce</span></p>
<p><span style="color: #000000;"><strong>Startup folder used for </strong></span><span style="color: #000000;"><b>persistency.</b></span></p>
<p><span style="color: #000000;">HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders</span></p>
<p><span style="color: #000000;">HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders</span></p>
<p><span style="color: #000000;">HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders</span></p>
<p><span style="color: #000000;">HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders</span></p>
<p><span style="color: #000000;"><strong>Tools used to detect and remove malware using persistence </strong></span><span style="color: #000000;"><b>method.</b></span></p>
<ul>
<li><span style="color: #000000;"><strong>Autoruns </strong><span style="color: #0000ff;"><a style="color: #0000ff;" href="https://learn.microsoft.com/en-us/sysinternals/downloads/autoruns">Autoruns for Windows &#8211; Sysinternals | Microsoft Learn</a></span></span></li>
<li><span style="color: #000000;"><strong>Sysmon </strong><span style="color: #0000ff;"><a style="color: #0000ff;" href="https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon">Sysmon &#8211; Sysinternals | Microsoft Learn</a></span></span></li>
<li><span style="color: #000000;"><strong>Endpoint Detection and Response such as:</strong></span></li>
<li><span style="color: #000000;"><strong>Crowdstrike </strong><span style="color: #0000ff;"><a style="color: #0000ff;" href="https://www.crowdstrike.com/">CrowdStrike: Stop breaches. Drive business</a></span></span></li>
<li><span style="color: #000000;"><strong>Sophos Intercept X Endpoint</strong> <span style="color: #0000ff;"><a style="color: #0000ff;" href="https://www.sophos.com/">https://www.sophos.com/</a></span></span></li>
<li><span style="color: #000000;"><strong>SentinelOne</strong> <span style="color: #0000ff;"><a style="color: #0000ff;" href="https://www.sentinelone.com/">SentinelOne | Autonomous AI Endpoint Security Platform | s1.ai</a></span></span></li>
<li><span style="color: #000000;"><strong>Microsoft Defender </strong><span style="color: #0000ff;"><a style="color: #0000ff;" href="https://www.microsoft.com/en-us/microsoft-365/microsoft-defender-for-individuals">Microsoft Defender for Individuals | Microsoft 365</a></span></span></li>
<li><span style="color: #000000;"><strong>PowerShell logging, PowerShell GetWmi-Object, OSQuery, Antimalware Scan Interface </strong><span style="color: #0000ff;"><a style="color: #0000ff;" href="https://redcanary.com/how-to-detect-persistence/">How to detect persistence mechanisms with seven different tools (redcanary.com)</a></span></span></li>
</ul>
<p><span style="color: #000000;"><strong> </strong>In conclusion, the persistence method is one of the favorites methods used by the threats actors to compromise the system. They are many malware that used the technics described above to maintain the foothold to the system. Following the best practices such as using tools to detect and remove the malware is the key to stay protected.</span></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=100%2C100&#038;ssl=1" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=200%2C200&#038;ssl=1 2x" width="100" height="100" alt="Bangaly Koita" class="avatar avatar-100 wp-user-avatar wp-user-avatar-100 photo avatar-default" /></div><div class="saboxplugin-authorname"><a href="https://www.osintafrica.net/author/admin/" class="vcard author" rel="author"><span class="fn">Bangaly Koita</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.</p>
</div></div><div class="saboxplugin-web "><a href="https://osintafrica.net" target="_self" >osintafrica.net</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/bangaly-koita-68b8b912a/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a></div></div></div><p>The post <a href="https://www.osintafrica.net/persistence-methods-used-by-malware/">Persistence methods used by malware</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">506</post-id>	</item>
	</channel>
</rss>
