Windows Registry Attacks Cheat Sheet
Windows Registry Attacks Cheat Sheet
The Windows Registry Editor, commonly referred to as regedit, is a graphical tool in the Microsoft Windows operating system that allows
authorized users to view and modify the Windows registry. The registry itself is a hierarchical database that stores configuration settings and
options for the operating system, including information about hardware, software, user preferences, and system settings. Here is a table
summarizing the function and description of each HKEY hive in the Windows Registry:
This hive contains information about registered applications, including file associations and OLE
Object Class IDs that tell Windows which programs to use for opening specific files. It merges data
HKEY_CLASSES_ROOT (HKCR)
from HKEY_LOCAL_MACHINE\Software\Classes and HKEY_CURRENT_USER\Software\Classes,
prioritizing user-specific settings over system defaults
This hive stores configuration information related to the currently logged-in user, including
HKEY_CURRENT_USER (HKCU) personalized settings like desktop background, screensavers, and application settings. It is
dynamically linked to a specific subkey in HKEY_USERS that corresponds to the user
This hive contains configuration data that applies to the computer regardless of who is logged in. It
HKEY_LOCAL_MACHINE (HKLM) includes information about the system's hardware, installed software, security settings, and other
system-wide settings.
This hive includes subkeys corresponding to each user profile on the system. Each subkey contains
HKEY_USERS (HKU) the same type of information as HKEY_CURRENT_USER for each user. It serves as a master list of
user settings on the computer
This hive contains information about the hardware profile that is currently in use by the system. It is
HKEY_CURRENT_CONFIG (HKCC)
used primarily for system configuration details such as which hardware profile is active
This table provides a simplified overview of the primary functions and roles of each major registry hive in the Windows operating system.
Registry hives are logical containers within the Windows Registry, designed to group related information together. Each hive contains a
specific set of keys, subkeys, and values, organizing configuration data in a way that supports the management of system and user settings.
Hives play a crucial role in the functioning of Windows by organizing and storing configuration data, making it easier to manage and
troubleshoot system and user settings.
https://www.linkedin.com/in/harunseker/ 1
Here's a detailed table summarizing the top 20 different examples of Windows Registry attacks, outlining the purpose of each
attack and providing specific details along with examples of how each is executed:
Attack
Purpose Detail of Execution Example of Execution
https://www.linkedin.com/in/harunseker/ 2
Ryuk ransomware modifies
Ransomware Ryuk adds a new value in
run keys to load the
Activation HKLM\Software\Microsoft\Windows\CurrentVersion\Run to execute its
ransomware during system
(Ryuk) encryption routine.
startup.
Changes UserInit or
User Logon Shell keys to execute Malware modifies HKLM\SOFTWARE\Microsoft\Windows
Hijacking malicious scripts at user NT\CurrentVersion\Winlogon\Userinit to include a malicious script.
logon.
Adds entries to
A rootkit adds itself to
Early Malware BootExecute to execute
HKLM\System\CurrentControlSet\Control\Session
Execution malware before the operating
Manager\BootExecute for early system execution.
system fully loads.
https://www.linkedin.com/in/harunseker/ 3
Persistence Adds links to malicious Malware adds a new entry in
via Startup programs in the Startup folder HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User
Folder through the Registry. Shell Folders pointing to its executable.
https://www.linkedin.com/in/harunseker/ 4
Dumps the Security Account
Credential
Manager (SAM) database Tools like Mimikatz modify HKLM\SYSTEM\CurrentControlSet\Control\Lsa
Dumping via
from the registry to extract to dump credentials stored in the SAM.
SAM Keys
password hashes.
https://www.linkedin.com/in/harunseker/ 5
This table provides a comprehensive overview of the diverse and sophisticated ways in which attackers can leverage the
Windows Registry to conduct malicious activities, emphasizing the need for vigilant monitoring and robust security measures to
protect against such threats.
https://www.linkedin.com/in/harunseker/ 6