diff --git a/atomics/T1546/T1546.yaml b/atomics/T1546/T1546.yaml index a8055031..4858b93d 100644 --- a/atomics/T1546/T1546.yaml +++ b/atomics/T1546/T1546.yaml @@ -168,4 +168,18 @@ atomic_tests: cleanup_command: |- reg delete "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\TestDVCPlugin" /f name: command_prompt - elevation_required: true \ No newline at end of file + elevation_required: true +- name: Persistence using STARTUP-PATH in MS-WORD + description: |- + When Word starts, it searches for the registry key HKCU\Software\Microsoft\Office\\Word\Options\STARTUP-PATH and if it exists, + it will treat it as a user specific start-up folder and load the contents of the folder with file extensions of .wll,.lnk,.dotm,.dot,.dotx + The registry key can be abused to load malware from the mentioned path. Reboot might be required. + supported_platforms: + - windows + executor: + command: |- + reg add "HKCU\Software\Microsoft\Office\16.0\Word\Options" /v STARTUP-PATH /t REG_SZ /d "C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Recent" /f + cleanup_command: |- + reg delete HKCU\Software\Microsoft\Office\16.0\Word\Options /v STARTUP-PATH /f + name: command_prompt + elevation_required: true