Windows Registry Actions

Malware authors use Windows Registry actions to manipulate the Windows Registry database, which stores critical system configurations and user preferences. By creating, modifying, or deleting registry keys and values, the malware can alter system behavior, persist after reboot, or evade detection. For instance, adding a new key can establish persistence, ensuring that the malware runs every time the system starts. Modifying values or changing access control lists (ACLs) might disable security features, like antivirus programs, or allow unauthorized access to sensitive system parts. Deleting keys or values could erase traces of malicious activity, further hiding the presence of the malware.

This technique is often used in attacks involving persistence (such as Remote Access Trojans or RATs), privilege escalation, and evasion. Ransomware may also utilize these actions to ensure it launches after a system restart.

Featured Windows APIs

Associated Code Snippets

Id Name Language Author Published Date
59 Delete Registry Value Delphi logoDelphi DarkCoderSc 3 weeks, 6 days ago.
58 Rename Registry Key Delphi logoDelphi DarkCoderSc 3 weeks, 6 days ago.
56 Create or Modify Registry Value Delphi logoDelphi DarkCoderSc 3 weeks, 6 days ago.
55 Delete Registry Key Delphi logoDelphi DarkCoderSc 3 weeks, 6 days ago.
54 Create New Registry Key (Sub Key) Delphi logoDelphi DarkCoderSc 3 weeks, 6 days ago.

Associated Features

Feature Name Dangerousness Key Categories
Registry Manager logoRegistry Manager High Exfiltration, Credentials, Alteration, Disruption, System Management
Destructive Operations logoDestructive Operations High Alteration, Disruption