What is Modify Registry?
Adversaries may interact with the Windows Registry to hide configuration information within Registry keys, remove information as part of cleaning up, or as part of other techniques to aid in persistence and execution. Access to specific areas of the Registry depends on account permissions, some requiring administrator-level access. The entire Registry is not susceptible to manipulation; however, adversaries may use Registry modifications for hiding malicious content, disabling security features, and establishing persistence through run keys and service configurations. Registry keys can store malicious payloads, configuration data for malware, and encoded scripts that are decoded and executed at runtime. Modifying registry settings for security tools, network configurations, and system policies allows attackers to weaken defenses, disable monitoring, and create conditions favorable for their operation. The Windows Registry is a critical target for forensic analysis during incident response, making its manipulation a priority for sophisticated attackers seeking to remove evidence of compromise.
“Modify Registry is documented as technique T1112 in the MITRE ATT&CK knowledge base under the Defense Evasion tactic. Detection requires visibility into XDR, SIEM telemetry.”