Detections
- Home
- - Detections
- -DT148
- ID: DT148
- Created: 23rd October 2025
- Updated: 23rd October 2025
- Platform: Windows
- MITRE ATT&CK®: DS0024
- Contributor: The ITM Team
Installed Software via Registry
Three key registry paths can be used to enumerate installed software:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
Registry values of interest include:
DisplayName- the name of the applicationDisplayVersion- the version of the applicationInstallLocation- the location on disk where files related to the application are storedPublisher- the publisher of the application
Sections
| ID | Name | Description |
|---|---|---|
| IF009 | Installing Unapproved Software | A subject installs software onto an organization-managed system without prior approval or outside sanctioned methods (e.g., centralized package management, internal software portals). This behavior spans a spectrum of risk - from seemingly benign installations (e.g., video games, personal browsers, media players) to unauthorized deployment of potentially harmful tools sourced from unvetted repositories or adversarial infrastructure.
The infringement may involve:
While some installations may appear harmless, unapproved software installs can represent a breakdown in configuration control and acceptable use. In high-risk scenarios, such software may introduce remote access mechanisms, data exfiltration capabilities, or other malware. Even benign cases signal behavioral drift, particularly when repeated or ignored, and can contribute to software sprawl, policy erosion, or eventual exploitation. |
| PR003 | Software Installation | A subject may install or attempt to install software that will be used to exfiltrate sensitive data or contravene internal policies. |
| ME002 | Unrestricted Software Installation | A subject can install software on a device without restriction. |
| AF022 | Virtualization | The subject leverages virtualization technologies—including hypervisors and virtual machines—to obscure forensic artifacts, isolate malicious activity, or evade host-based monitoring. By conducting operations within a guest operating system, the subject reduces visibility to host-level security tools and complicates the forensic process by separating volatile and persistent data across system boundaries.
This strategy allows the subject to:
|
| IF029 | Codebase Integrity Compromise | A subject introduces, modifies, or manages code within an organizational repository in a manner that compromises the integrity, security, governance, or intended function of the codebase. This includes the addition of unauthorized features, insecure or non-compliant implementations, malicious logic, or changes that alter system behavior outside approved processes or expectations.
These actions occur through legitimate development workflows, such as commits, pull requests, merges, or dependency updates, using access granted as part of the subject’s role. As a result, the activity often appears routine at the point of execution and may inherit implicit trust through standard development and deployment pipelines.
Codebase integrity compromise may manifest in multiple forms, including:
The defining characteristic of this behavior is the misuse of trusted development access to alter the codebase in a way that undermines organisational control, security, or operational intent. The resulting impact may be immediate or delayed, with harmful effects often emerging only after deployment, integration, or specific runtime conditions are met. |
| PR038 | AI-Assisted Capability Development | A subject uses artificial intelligence systems to acquire knowledge and understanding that enables them to bypass controls, exploit systems, or perform actions outside of their legitimate business needs.
This behavior involves interacting with AI tools, such as browser-based assistants or integrated software features, to obtain explanations, procedural guidance, or technical instruction that can be directly applied within the organizational environment. Through iterative prompting, the subject refines their understanding, resolves uncertainties, and develops the capability required to execute actions they would not otherwise be able to perform.
Unlike traditional research methods, which rely on static sources and require independent interpretation, AI systems provide responsive, context-aware assistance that accelerates comprehension and reduces the effort required to translate knowledge into action. This allows subjects to overcome technical barriers quickly and operate beyond their expected level of expertise.
The defining characteristic of this behavior is the development of actionable capability through AI-assisted understanding, specifically where that capability can be used to defeat controls, circumvent safeguards, or misuse access. The subject is not simply gathering information, but actively building the means to act in a way that conflicts with organizational policy or intent.
This preparation technique may support a wide range of downstream behaviors across the matrix, including unauthorized access, data manipulation, process circumvention, or anti-forensic activity. The AI system functions as an on-demand technical guide, enabling the subject to operationalize intent without formal training or prior experience. |
| IF009.002 | Inappropriate Software | A subject installs software that is not considered appropriate by the organization. |
| IF009.005 | Anti-Sleep Software | The subject installs or enables software, scripts, or hardware devices designed to prevent systems from automatically locking, logging out, or entering sleep mode. This unauthorized action deliberately subverts security controls intended to protect unattended systems from unauthorized access.
Characteristics
Example ScenarioA subject installs unauthorized anti-sleep software on a corporate laptop to prevent automatic locking during idle periods. As a result, the device remains accessible even when left unattended in unsecured environments such as cafes, airports, or shared workspaces. This action bypasses mandatory screen-lock policies and renders full disk encryption protections ineffective, exposing sensitive organizational data to theft or compromise by malicious third parties who can physically access the unattended device. |
| IF009.006 | Installing Crypto Mining Software | The subject installs and operates unauthorized cryptocurrency mining software on organizational systems, leveraging compute, network, and energy resources for personal financial gain. This activity subverts authorized system use policies, degrades operational performance, increases attack surface, and introduces external control risks.
Characteristics
Example ScenarioA subject installs a customized |
| IF009.001 | Unwanted Software | A subject installs software that is not inherently malicious, but is not wanted, commonly known as “greyware” or “potentially unwanted programs”. |
| AF022.001 | Use of a Virtual Machine | The subject uses a virtual machine (VM) on an organization device to contain artifacts of forensic value within the virtualized environment, preventing them from being written to the host file system. This strategy helps to obscure evidence and complicate forensic investigations. By running a guest operating system within a VM, the subject can potentially evade detection by security agents installed on the host operating system, as these agents may not have visibility into activities occurring within the VM. This adds an additional layer of complexity to forensic analysis, making it more challenging to detect and attribute malicious activities. |
| PR025.004 | File Download via Cloud Storage Synchronization | The subject retrieves files by syncing with cloud storage platforms such as OneDrive, Google Drive, or Dropbox. Files may be selectively synced or fully mirrored to the endpoint.
This method blends with legitimate enterprise workflows and may evade traditional download detection mechanisms, especially where cloud services are sanctioned. It also enables large-scale or continuous ingestion of data with minimal user interaction. |
| PR025.006 | File Download via Messaging Platforms | The subject retrieves files from enterprise or consumer messaging platforms such as Teams, Slack, or other collaboration tools. Files may be shared directly in chats, channels, or through integrated file storage components.
Messaging platforms often operate as semi-trusted environments, particularly when enterprise-approved, allowing file transfers to blend with legitimate collaboration. Where personal or unsanctioned messaging platforms are used, visibility may be significantly reduced or absent. |
| PR025.008 | File Download via API or Application Integration | The subject uses APIs or integrated applications (e.g., Git clients, SaaS integrations, or custom scripts) to pull files from external systems. This includes automated retrieval from repositories, data platforms, or third-party services.
This behavior is often tied to legitimate workflows but may be repurposed to extract or stage data at scale, particularly where API access is insufficiently monitored. |
MITRE ATT&CK® Mapping (1)
ATT&CK Enterprise Matrix Version 18.1