diff --git a/atomics/Indexes/Indexes-CSV/index.csv b/atomics/Indexes/Indexes-CSV/index.csv
index 440e572d..d9dd67a6 100644
--- a/atomics/Indexes/Indexes-CSV/index.csv
+++ b/atomics/Indexes/Indexes-CSV/index.csv
@@ -488,6 +488,20 @@ defense-evasion,T1112,Modify Registry,13,Disable Windows Shutdown Button,6e0d113
defense-evasion,T1112,Modify Registry,14,Disable Windows LogOff Button,e246578a-c24d-46a7-9237-0213ff86fb0c,command_prompt
defense-evasion,T1112,Modify Registry,15,Disable Windows Change Password Feature,d4a6da40-618f-454d-9a9e-26af552aaeb0,command_prompt
defense-evasion,T1112,Modify Registry,16,Disable Windows Lock Workstation Feature,3dacb0d2-46ee-4c27-ac1b-f9886bf91a56,command_prompt
+defense-evasion,T1112,Modify Registry,17,Activate Windows NoDesktop Group Policy Feature,93386d41-525c-4a1b-8235-134a628dee17,command_prompt
+defense-evasion,T1112,Modify Registry,18,Activate Windows NoRun Group Policy Feature,d49ff3cc-8168-4123-b5b3-f057d9abbd55,command_prompt
+defense-evasion,T1112,Modify Registry,19,Activate Windows NoFind Group Policy Feature,ffbb407e-7f1d-4c95-b22e-548169db1fbd,command_prompt
+defense-evasion,T1112,Modify Registry,20,Activate Windows NoControlPanel Group Policy Feature,a450e469-ba54-4de1-9deb-9023a6111690,command_prompt
+defense-evasion,T1112,Modify Registry,21,Activate Windows NoFileMenu Group Policy Feature,5e27bdb4-7fd9-455d-a2b5-4b4b22c9dea4,command_prompt
+defense-evasion,T1112,Modify Registry,22,Activate Windows NoClose Group Policy Feature,12f50e15-dbc6-478b-a801-a746e8ba1723,command_prompt
+defense-evasion,T1112,Modify Registry,23,Activate Windows NoSetTaskbar Group Policy Feature,d29b7faf-7355-4036-9ed3-719bd17951ed,command_prompt
+defense-evasion,T1112,Modify Registry,24,Activate Windows NoTrayContextMenu Group Policy Feature,4d72d4b1-fa7b-4374-b423-0fe326da49d2,command_prompt
+defense-evasion,T1112,Modify Registry,25,Activate Windows NoPropertiesMyDocuments Group Policy Feature,20fc9daa-bd48-4325-9aff-81b967a84b1d,command_prompt
+defense-evasion,T1112,Modify Registry,26,Hide Windows Clock Group Policy Feature,8023db1e-ad06-4966-934b-b6a0ae52689e,command_prompt
+defense-evasion,T1112,Modify Registry,27,Windows HideSCAHealth Group Policy Feature,a4637291-40b1-4a96-8c82-b28f1d73e54e,command_prompt
+defense-evasion,T1112,Modify Registry,28,Windows HideSCANetwork Group Policy Feature,3e757ce7-eca0-411a-9583-1c33b8508d52,command_prompt
+defense-evasion,T1112,Modify Registry,29,Windows HideSCAPower Group Policy Feature,8d85a5d8-702f-436f-bc78-fcd9119496fc,command_prompt
+defense-evasion,T1112,Modify Registry,30,Windows HideSCAVolume Group Policy Feature,7f037590-b4c6-4f13-b3cc-e424c5ab8ade,command_prompt
defense-evasion,T1218.005,Mshta,1,Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject,1483fab9-4f52-4217-a9ce-daa9d7747cae,command_prompt
defense-evasion,T1218.005,Mshta,2,Mshta executes VBScript to execute malicious command,906865c3-e05f-4acc-85c4-fbc185455095,command_prompt
defense-evasion,T1218.005,Mshta,3,Mshta Executes Remote HTML Application (HTA),c4b97eeb-5249-4455-a607-59f95485cb45,powershell
diff --git a/atomics/Indexes/Indexes-CSV/windows-index.csv b/atomics/Indexes/Indexes-CSV/windows-index.csv
index 7415432b..5878040a 100644
--- a/atomics/Indexes/Indexes-CSV/windows-index.csv
+++ b/atomics/Indexes/Indexes-CSV/windows-index.csv
@@ -318,6 +318,20 @@ defense-evasion,T1112,Modify Registry,13,Disable Windows Shutdown Button,6e0d113
defense-evasion,T1112,Modify Registry,14,Disable Windows LogOff Button,e246578a-c24d-46a7-9237-0213ff86fb0c,command_prompt
defense-evasion,T1112,Modify Registry,15,Disable Windows Change Password Feature,d4a6da40-618f-454d-9a9e-26af552aaeb0,command_prompt
defense-evasion,T1112,Modify Registry,16,Disable Windows Lock Workstation Feature,3dacb0d2-46ee-4c27-ac1b-f9886bf91a56,command_prompt
+defense-evasion,T1112,Modify Registry,17,Activate Windows NoDesktop Group Policy Feature,93386d41-525c-4a1b-8235-134a628dee17,command_prompt
+defense-evasion,T1112,Modify Registry,18,Activate Windows NoRun Group Policy Feature,d49ff3cc-8168-4123-b5b3-f057d9abbd55,command_prompt
+defense-evasion,T1112,Modify Registry,19,Activate Windows NoFind Group Policy Feature,ffbb407e-7f1d-4c95-b22e-548169db1fbd,command_prompt
+defense-evasion,T1112,Modify Registry,20,Activate Windows NoControlPanel Group Policy Feature,a450e469-ba54-4de1-9deb-9023a6111690,command_prompt
+defense-evasion,T1112,Modify Registry,21,Activate Windows NoFileMenu Group Policy Feature,5e27bdb4-7fd9-455d-a2b5-4b4b22c9dea4,command_prompt
+defense-evasion,T1112,Modify Registry,22,Activate Windows NoClose Group Policy Feature,12f50e15-dbc6-478b-a801-a746e8ba1723,command_prompt
+defense-evasion,T1112,Modify Registry,23,Activate Windows NoSetTaskbar Group Policy Feature,d29b7faf-7355-4036-9ed3-719bd17951ed,command_prompt
+defense-evasion,T1112,Modify Registry,24,Activate Windows NoTrayContextMenu Group Policy Feature,4d72d4b1-fa7b-4374-b423-0fe326da49d2,command_prompt
+defense-evasion,T1112,Modify Registry,25,Activate Windows NoPropertiesMyDocuments Group Policy Feature,20fc9daa-bd48-4325-9aff-81b967a84b1d,command_prompt
+defense-evasion,T1112,Modify Registry,26,Hide Windows Clock Group Policy Feature,8023db1e-ad06-4966-934b-b6a0ae52689e,command_prompt
+defense-evasion,T1112,Modify Registry,27,Windows HideSCAHealth Group Policy Feature,a4637291-40b1-4a96-8c82-b28f1d73e54e,command_prompt
+defense-evasion,T1112,Modify Registry,28,Windows HideSCANetwork Group Policy Feature,3e757ce7-eca0-411a-9583-1c33b8508d52,command_prompt
+defense-evasion,T1112,Modify Registry,29,Windows HideSCAPower Group Policy Feature,8d85a5d8-702f-436f-bc78-fcd9119496fc,command_prompt
+defense-evasion,T1112,Modify Registry,30,Windows HideSCAVolume Group Policy Feature,7f037590-b4c6-4f13-b3cc-e424c5ab8ade,command_prompt
defense-evasion,T1218.005,Mshta,1,Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject,1483fab9-4f52-4217-a9ce-daa9d7747cae,command_prompt
defense-evasion,T1218.005,Mshta,2,Mshta executes VBScript to execute malicious command,906865c3-e05f-4acc-85c4-fbc185455095,command_prompt
defense-evasion,T1218.005,Mshta,3,Mshta Executes Remote HTML Application (HTA),c4b97eeb-5249-4455-a607-59f95485cb45,powershell
diff --git a/atomics/Indexes/Indexes-Markdown/index.md b/atomics/Indexes/Indexes-Markdown/index.md
index 85d3ea02..10082dba 100644
--- a/atomics/Indexes/Indexes-Markdown/index.md
+++ b/atomics/Indexes/Indexes-Markdown/index.md
@@ -763,6 +763,20 @@
- Atomic Test #14: Disable Windows LogOff Button [windows]
- Atomic Test #15: Disable Windows Change Password Feature [windows]
- Atomic Test #16: Disable Windows Lock Workstation Feature [windows]
+ - Atomic Test #17: Activate Windows NoDesktop Group Policy Feature [windows]
+ - Atomic Test #18: Activate Windows NoRun Group Policy Feature [windows]
+ - Atomic Test #19: Activate Windows NoFind Group Policy Feature [windows]
+ - Atomic Test #20: Activate Windows NoControlPanel Group Policy Feature [windows]
+ - Atomic Test #21: Activate Windows NoFileMenu Group Policy Feature [windows]
+ - Atomic Test #22: Activate Windows NoClose Group Policy Feature [windows]
+ - Atomic Test #23: Activate Windows NoSetTaskbar Group Policy Feature [windows]
+ - Atomic Test #24: Activate Windows NoTrayContextMenu Group Policy Feature [windows]
+ - Atomic Test #25: Activate Windows NoPropertiesMyDocuments Group Policy Feature [windows]
+ - Atomic Test #26: Hide Windows Clock Group Policy Feature [windows]
+ - Atomic Test #27: Windows HideSCAHealth Group Policy Feature [windows]
+ - Atomic Test #28: Windows HideSCANetwork Group Policy Feature [windows]
+ - Atomic Test #29: Windows HideSCAPower Group Policy Feature [windows]
+ - Atomic Test #30: Windows HideSCAVolume Group Policy Feature [windows]
- T1601 Modify System Image [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1218.005 Mshta](../../T1218.005/T1218.005.md)
- Atomic Test #1: Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject [windows]
diff --git a/atomics/Indexes/Indexes-Markdown/windows-index.md b/atomics/Indexes/Indexes-Markdown/windows-index.md
index e93541ee..78c1737f 100644
--- a/atomics/Indexes/Indexes-Markdown/windows-index.md
+++ b/atomics/Indexes/Indexes-Markdown/windows-index.md
@@ -530,6 +530,20 @@
- Atomic Test #14: Disable Windows LogOff Button [windows]
- Atomic Test #15: Disable Windows Change Password Feature [windows]
- Atomic Test #16: Disable Windows Lock Workstation Feature [windows]
+ - Atomic Test #17: Activate Windows NoDesktop Group Policy Feature [windows]
+ - Atomic Test #18: Activate Windows NoRun Group Policy Feature [windows]
+ - Atomic Test #19: Activate Windows NoFind Group Policy Feature [windows]
+ - Atomic Test #20: Activate Windows NoControlPanel Group Policy Feature [windows]
+ - Atomic Test #21: Activate Windows NoFileMenu Group Policy Feature [windows]
+ - Atomic Test #22: Activate Windows NoClose Group Policy Feature [windows]
+ - Atomic Test #23: Activate Windows NoSetTaskbar Group Policy Feature [windows]
+ - Atomic Test #24: Activate Windows NoTrayContextMenu Group Policy Feature [windows]
+ - Atomic Test #25: Activate Windows NoPropertiesMyDocuments Group Policy Feature [windows]
+ - Atomic Test #26: Hide Windows Clock Group Policy Feature [windows]
+ - Atomic Test #27: Windows HideSCAHealth Group Policy Feature [windows]
+ - Atomic Test #28: Windows HideSCANetwork Group Policy Feature [windows]
+ - Atomic Test #29: Windows HideSCAPower Group Policy Feature [windows]
+ - Atomic Test #30: Windows HideSCAVolume Group Policy Feature [windows]
- [T1218.005 Mshta](../../T1218.005/T1218.005.md)
- Atomic Test #1: Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject [windows]
- Atomic Test #2: Mshta executes VBScript to execute malicious command [windows]
diff --git a/atomics/Indexes/index.yaml b/atomics/Indexes/index.yaml
index f3b8af6a..6074038f 100644
--- a/atomics/Indexes/index.yaml
+++ b/atomics/Indexes/index.yaml
@@ -31782,7 +31782,7 @@ defense-evasion:
auto_generated_guid: ac34b0f7-0f85-4ac0-b93e-3ced2bc69bb8
description: |
Modify the registry of the currently logged in user using reg.exe via cmd console to disable the windows registry tool to prevent user modifying registry entry.
- See example how Agent Tesla malware abuse this technique: https://any.run/report/ea4ea08407d4ee72e009103a3b77e5a09412b722fdef67315ea63f22011152af/a866d7b1-c236-4f26-a391-5ae32213dfc4#registry
+ See example how Agent Tesla malware abuses this technique: https://any.run/report/ea4ea08407d4ee72e009103a3b77e5a09412b722fdef67315ea63f22011152af/a866d7b1-c236-4f26-a391-5ae32213dfc4#registry
supported_platforms:
- windows
executor:
@@ -31800,7 +31800,7 @@ defense-evasion:
auto_generated_guid: d2561a6d-72bd-408c-b150-13efe1801c2a
description: |
Modify the registry of the currently logged in user using reg.exe via cmd console to disable the windows CMD application.
- See example how Agent Tesla malware abuse this technique: https://any.run/report/ea4ea08407d4ee72e009103a3b77e5a09412b722fdef67315ea63f22011152af/a866d7b1-c236-4f26-a391-5ae32213dfc4#registry
+ See example how Agent Tesla malware abuses this technique: https://any.run/report/ea4ea08407d4ee72e009103a3b77e5a09412b722fdef67315ea63f22011152af/a866d7b1-c236-4f26-a391-5ae32213dfc4#registry
supported_platforms:
- windows
executor:
@@ -31818,7 +31818,7 @@ defense-evasion:
auto_generated_guid: af254e70-dd0e-4de6-9afe-a994d9ea8b62
description: |
Modify the registry of the currently logged in user using reg.exe via cmd console to disable the windows task manager application.
- See example how Agent Tesla malware abuse this technique: https://any.run/report/ea4ea08407d4ee72e009103a3b77e5a09412b722fdef67315ea63f22011152af/a866d7b1-c236-4f26-a391-5ae32213dfc4#registry
+ See example how Agent Tesla malware abuses this technique: https://any.run/report/ea4ea08407d4ee72e009103a3b77e5a09412b722fdef67315ea63f22011152af/a866d7b1-c236-4f26-a391-5ae32213dfc4#registry
supported_platforms:
- windows
executor:
@@ -31836,7 +31836,7 @@ defense-evasion:
auto_generated_guid: c0d6d67f-1f63-42cc-95c0-5fd6b20082ad
description: |
Modify the registry of the currently logged in user using reg.exe via cmd console to disable the windows notification center.
- See how remcos rat abuse this technique- https://tccontre.blogspot.com/2020/01/remcos-rat-evading-windows-defender-av.html
+ See how remcos rat abuses this technique- https://tccontre.blogspot.com/2020/01/remcos-rat-evading-windows-defender-av.html
supported_platforms:
- windows
executor:
@@ -31854,7 +31854,7 @@ defense-evasion:
auto_generated_guid: 6e0d1131-2d7e-4905-8ca5-d6172f05d03d
description: |
Modify the registry of the currently logged in user using reg.exe via cmd console to disable the windows shutdown button.
- See how ransomware abuse this technique- https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.msil.screenlocker.a/
+ See how ransomware abuses this technique- https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.msil.screenlocker.a/
supported_platforms:
- windows
executor:
@@ -31872,7 +31872,7 @@ defense-evasion:
auto_generated_guid: e246578a-c24d-46a7-9237-0213ff86fb0c
description: |
Modify the registry of the currently logged in user using reg.exe via cmd console to disable the windows logoff button.
- See how ransomware abuse this technique- https://www.trendmicro.com/vinfo/be/threat-encyclopedia/search/js_noclose.e/2
+ See how ransomware abuses this technique- https://www.trendmicro.com/vinfo/be/threat-encyclopedia/search/js_noclose.e/2
supported_platforms:
- windows
executor:
@@ -31888,7 +31888,7 @@ defense-evasion:
auto_generated_guid: d4a6da40-618f-454d-9a9e-26af552aaeb0
description: |
Modify the registry of the currently logged in user using reg.exe via cmd console to disable the windows change password feature.
- See how ransomware abuse this technique- https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom_heartbleed.thdobah
+ See how ransomware abuses this technique- https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom_heartbleed.thdobah
supported_platforms:
- windows
executor:
@@ -31906,7 +31906,7 @@ defense-evasion:
auto_generated_guid: 3dacb0d2-46ee-4c27-ac1b-f9886bf91a56
description: |
Modify the registry of the currently logged in user using reg.exe via cmd console to disable the windows Lock workstation feature.
- See how ransomware abuse this technique- https://www.bleepingcomputer.com/news/security/in-dev-ransomware-forces-you-do-to-survey-before-unlocking-computer/
+ See how ransomware abuses this technique- https://www.bleepingcomputer.com/news/security/in-dev-ransomware-forces-you-do-to-survey-before-unlocking-computer/
supported_platforms:
- windows
executor:
@@ -31917,6 +31917,268 @@ defense-evasion:
cleanup_command: 'reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System"
/v DisableLockWorkstation /f >nul 2>&1
+'
+ name: command_prompt
+ elevation_required: true
+ - name: Activate Windows NoDesktop Group Policy Feature
+ auto_generated_guid: 93386d41-525c-4a1b-8235-134a628dee17
+ description: "Modify the registry of the currently logged in user using reg.exe
+ via cmd console to hide all icons on Desktop Group Policy. \nTake note that
+ some Group Policy changes might require a restart to take effect.\nSee how
+ Trojan abuses this technique- https://www.sophos.com/de-de/threat-center/threat-analyses/viruses-and-spyware/Troj~Krotten-N/detailed-analysis\n"
+ supported_platforms:
+ - windows
+ executor:
+ command: 'reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v NoDesktop /t REG_DWORD /d 1 /f
+
+'
+ cleanup_command: 'reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v NoDesktop /f >nul 2>&1
+
+'
+ name: command_prompt
+ elevation_required: true
+ - name: Activate Windows NoRun Group Policy Feature
+ auto_generated_guid: d49ff3cc-8168-4123-b5b3-f057d9abbd55
+ description: |
+ Modify the registry of the currently logged in user using reg.exe via cmd console to Remove Run menu from Start Menu Group Policy.
+ Take note that some Group Policy changes might require a restart to take effect.
+ See how Trojan abuses this technique- https://www.sophos.com/de-de/threat-center/threat-analyses/viruses-and-spyware/Troj~Krotten-N/detailed-analysis
+ supported_platforms:
+ - windows
+ executor:
+ command: 'reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v NoRun /t REG_DWORD /d 1 /f
+
+'
+ cleanup_command: "reg delete \"HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\"
+ /v NoRun /f \n"
+ name: command_prompt
+ elevation_required: true
+ - name: Activate Windows NoFind Group Policy Feature
+ auto_generated_guid: ffbb407e-7f1d-4c95-b22e-548169db1fbd
+ description: |
+ Modify the registry of the currently logged in user using reg.exe via cmd console to Remove Search menu from Start Menu Group Policy.
+ Take note that some Group Policy changes might require a restart to take effect.
+ See how Trojan abuses this technique- https://www.sophos.com/de-de/threat-center/threat-analyses/viruses-and-spyware/Troj~Krotten-N/detailed-analysis
+ supported_platforms:
+ - windows
+ executor:
+ command: 'reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v NoFind /t REG_DWORD /d 1 /f
+
+'
+ cleanup_command: 'reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v NoFind /f >nul 2>&1
+
+'
+ name: command_prompt
+ elevation_required: true
+ - name: Activate Windows NoControlPanel Group Policy Feature
+ auto_generated_guid: a450e469-ba54-4de1-9deb-9023a6111690
+ description: "Modify the registry of the currently logged in user using reg.exe
+ via cmd console to Disable Control Panel Group Policy. \nTake note that some
+ Group Policy changes might require a restart to take effect.\nSee how Trojan
+ abuses this technique- https://www.sophos.com/de-de/threat-center/threat-analyses/viruses-and-spyware/Troj~Krotten-N/detailed-analysis\n"
+ supported_platforms:
+ - windows
+ executor:
+ command: 'reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v NoControlPanel /t REG_DWORD /d 1 /f
+
+'
+ cleanup_command: 'reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v NoControlPanel /f >nul 2>&1
+
+'
+ name: command_prompt
+ elevation_required: true
+ - name: Activate Windows NoFileMenu Group Policy Feature
+ auto_generated_guid: 5e27bdb4-7fd9-455d-a2b5-4b4b22c9dea4
+ description: "Modify the registry of the currently logged in user using reg.exe
+ via cmd console to Remove File menu from Windows Explorer Group Policy. \nTake
+ note that some Group Policy changes might require a restart to take effect.\nSee
+ how Trojan abuses this technique- https://www.sophos.com/de-de/threat-center/threat-analyses/viruses-and-spyware/Troj~Krotten-N/detailed-analysis\n"
+ supported_platforms:
+ - windows
+ executor:
+ command: 'reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v NoFileMenu /t REG_DWORD /d 1 /f
+
+'
+ cleanup_command: 'reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v NoFileMenu /f >nul 2>&1
+
+'
+ name: command_prompt
+ elevation_required: true
+ - name: Activate Windows NoClose Group Policy Feature
+ auto_generated_guid: 12f50e15-dbc6-478b-a801-a746e8ba1723
+ description: "Modify the registry of the currently logged in user using reg.exe
+ via cmd console to Disable and remove the Shut Down command Group Policy.
+ \nTake note that some Group Policy changes might require a restart to take
+ effect.\nSee how Trojan abuses this technique- https://www.sophos.com/de-de/threat-center/threat-analyses/viruses-and-spyware/Troj~Krotten-N/detailed-analysis\n"
+ supported_platforms:
+ - windows
+ executor:
+ command: 'reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v NoClose /t REG_DWORD /d 1 /f
+
+'
+ cleanup_command: 'reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v NoClose /f >nul 2>&1
+
+'
+ name: command_prompt
+ elevation_required: true
+ - name: Activate Windows NoSetTaskbar Group Policy Feature
+ auto_generated_guid: d29b7faf-7355-4036-9ed3-719bd17951ed
+ description: "Modify the registry of the currently logged in user using reg.exe
+ via cmd console to Disable changes to Taskbar and Start Menu Settings Group
+ Policy. \nTake note that some Group Policy changes might require a restart
+ to take effect.\nSee how ransomware abuses this technique- https://www.virustotal.com/gui/file/2d7855bf6470aa323edf2949b54ce2a04d9e38770f1322c3d0420c2303178d91/details\n"
+ supported_platforms:
+ - windows
+ executor:
+ command: 'reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v NoSetTaskbar /t REG_DWORD /d 1 /f
+
+'
+ cleanup_command: 'reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v NoSetTaskbar /f >nul 2>&1
+
+'
+ name: command_prompt
+ elevation_required: true
+ - name: Activate Windows NoTrayContextMenu Group Policy Feature
+ auto_generated_guid: 4d72d4b1-fa7b-4374-b423-0fe326da49d2
+ description: "Modify the registry of the currently logged in user using reg.exe
+ via cmd console to Disable context menu for taskbar Group Policy. \nTake note
+ that some Group Policy changes might require a restart to take effect.\nSee
+ how ransomware abuses this technique- https://www.virustotal.com/gui/file/2d7855bf6470aa323edf2949b54ce2a04d9e38770f1322c3d0420c2303178d91/details\n"
+ supported_platforms:
+ - windows
+ executor:
+ command: 'reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v StartMenuLogOff /t REG_DWORD /d 1 /f
+
+'
+ cleanup_command: 'reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v NoTrayContextMenu /f >nul 2>&1
+
+'
+ name: command_prompt
+ elevation_required: true
+ - name: Activate Windows NoPropertiesMyDocuments Group Policy Feature
+ auto_generated_guid: 20fc9daa-bd48-4325-9aff-81b967a84b1d
+ description: "Modify the registry of the currently logged in user using reg.exe
+ via cmd console to hide Properties from \"My Documents icon\" Group Policy.
+ \nTake note that some Group Policy changes might require a restart to take
+ effect.\nSee how ransomware abuses this technique- https://www.virustotal.com/gui/file/2d7855bf6470aa323edf2949b54ce2a04d9e38770f1322c3d0420c2303178d91/details\n"
+ supported_platforms:
+ - windows
+ executor:
+ command: "reg add \"HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\"
+ /v NoPropertiesMyDocuments /t REG_DWORD /d 1 \n"
+ cleanup_command: 'reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v NoPropertiesMyDocuments /f >nul 2>&1
+
+'
+ name: command_prompt
+ elevation_required: true
+ - name: Hide Windows Clock Group Policy Feature
+ auto_generated_guid: 8023db1e-ad06-4966-934b-b6a0ae52689e
+ description: "Modify the registry of the currently logged in user using reg.exe
+ via cmd console to Hide Clock Group Policy. \nTake note that some Group Policy
+ changes might require a restart to take effect.\nSee how ransomware abuses
+ this technique- https://www.virustotal.com/gui/file/2d7855bf6470aa323edf2949b54ce2a04d9e38770f1322c3d0420c2303178d91/details\n"
+ supported_platforms:
+ - windows
+ executor:
+ command: 'reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v HideClock /t REG_DWORD /d 1 /f
+
+'
+ cleanup_command: 'reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v HideClock /f >nul 2>&1
+
+'
+ name: command_prompt
+ elevation_required: true
+ - name: Windows HideSCAHealth Group Policy Feature
+ auto_generated_guid: a4637291-40b1-4a96-8c82-b28f1d73e54e
+ description: "Modify the registry of the currently logged in user using reg.exe
+ via cmd console to remove security and maintenance icon Group Policy. \nTake
+ note that some Group Policy changes might require a restart to take effect.\nSee
+ how ransomware abuses this technique- https://www.virustotal.com/gui/file/2d7855bf6470aa323edf2949b54ce2a04d9e38770f1322c3d0420c2303178d91/details\n"
+ supported_platforms:
+ - windows
+ executor:
+ command: 'reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v HideSCAHealth /t REG_DWORD /d 1 /f
+
+'
+ cleanup_command: 'reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v HideSCAHealth /f >nul 2>&1
+
+'
+ name: command_prompt
+ elevation_required: true
+ - name: Windows HideSCANetwork Group Policy Feature
+ auto_generated_guid: 3e757ce7-eca0-411a-9583-1c33b8508d52
+ description: "Modify the registry of the currently logged in user using reg.exe
+ via cmd console to remove the networking icon Group Policy. \nTake note that
+ some Group Policy changes might require a restart to take effect.\nSee how
+ ransomware abuses this technique- https://www.virustotal.com/gui/file/2d7855bf6470aa323edf2949b54ce2a04d9e38770f1322c3d0420c2303178d91/details\n"
+ supported_platforms:
+ - windows
+ executor:
+ command: 'reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v HideSCANetwork /t REG_DWORD /d 1 /f
+
+'
+ cleanup_command: 'reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v HideSCANetwork /f >nul 2>&1
+
+'
+ name: command_prompt
+ elevation_required: true
+ - name: Windows HideSCAPower Group Policy Feature
+ auto_generated_guid: 8d85a5d8-702f-436f-bc78-fcd9119496fc
+ description: "Modify the registry of the currently logged in user using reg.exe
+ via cmd console to remove the battery icon Group Policy. \nTake note that
+ some Group Policy changes might require a restart to take effect.\nSee how
+ ransomware abuses this technique- https://www.virustotal.com/gui/file/2d7855bf6470aa323edf2949b54ce2a04d9e38770f1322c3d0420c2303178d91/details\n"
+ supported_platforms:
+ - windows
+ executor:
+ command: 'reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v HideSCAPower /t REG_DWORD /d 1 /f
+
+'
+ cleanup_command: 'reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v HideSCAPower /f >nul 2>&1
+
+'
+ name: command_prompt
+ elevation_required: true
+ - name: Windows HideSCAVolume Group Policy Feature
+ auto_generated_guid: 7f037590-b4c6-4f13-b3cc-e424c5ab8ade
+ description: "Modify the registry of the currently logged in user using reg.exe
+ via cmd console to remove the volume icon Group Policy. \nTake note that some
+ Group Policy changes might require a restart to take effect..\nSee how ransomware
+ abuses this technique- https://www.virustotal.com/gui/file/2d7855bf6470aa323edf2949b54ce2a04d9e38770f1322c3d0420c2303178d91/details\n"
+ supported_platforms:
+ - windows
+ executor:
+ command: 'reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v HideSCAVolume /t REG_DWORD /d 1 /f
+
+'
+ cleanup_command: 'reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
+ /v HideSCAVolume /f >nul 2>&1
+
'
name: command_prompt
elevation_required: true
diff --git a/atomics/T1112/T1112.md b/atomics/T1112/T1112.md
index 921e28c8..95ff2ab5 100644
--- a/atomics/T1112/T1112.md
+++ b/atomics/T1112/T1112.md
@@ -42,6 +42,34 @@ The Registry of a remote system may be modified to aid in execution of files as
- [Atomic Test #16 - Disable Windows Lock Workstation Feature](#atomic-test-16---disable-windows-lock-workstation-feature)
+- [Atomic Test #17 - Activate Windows NoDesktop Group Policy Feature](#atomic-test-17---activate-windows-nodesktop-group-policy-feature)
+
+- [Atomic Test #18 - Activate Windows NoRun Group Policy Feature](#atomic-test-18---activate-windows-norun-group-policy-feature)
+
+- [Atomic Test #19 - Activate Windows NoFind Group Policy Feature](#atomic-test-19---activate-windows-nofind-group-policy-feature)
+
+- [Atomic Test #20 - Activate Windows NoControlPanel Group Policy Feature](#atomic-test-20---activate-windows-nocontrolpanel-group-policy-feature)
+
+- [Atomic Test #21 - Activate Windows NoFileMenu Group Policy Feature](#atomic-test-21---activate-windows-nofilemenu-group-policy-feature)
+
+- [Atomic Test #22 - Activate Windows NoClose Group Policy Feature](#atomic-test-22---activate-windows-noclose-group-policy-feature)
+
+- [Atomic Test #23 - Activate Windows NoSetTaskbar Group Policy Feature](#atomic-test-23---activate-windows-nosettaskbar-group-policy-feature)
+
+- [Atomic Test #24 - Activate Windows NoTrayContextMenu Group Policy Feature](#atomic-test-24---activate-windows-notraycontextmenu-group-policy-feature)
+
+- [Atomic Test #25 - Activate Windows NoPropertiesMyDocuments Group Policy Feature](#atomic-test-25---activate-windows-nopropertiesmydocuments-group-policy-feature)
+
+- [Atomic Test #26 - Hide Windows Clock Group Policy Feature](#atomic-test-26---hide-windows-clock-group-policy-feature)
+
+- [Atomic Test #27 - Windows HideSCAHealth Group Policy Feature](#atomic-test-27---windows-hidescahealth-group-policy-feature)
+
+- [Atomic Test #28 - Windows HideSCANetwork Group Policy Feature](#atomic-test-28---windows-hidescanetwork-group-policy-feature)
+
+- [Atomic Test #29 - Windows HideSCAPower Group Policy Feature](#atomic-test-29---windows-hidescapower-group-policy-feature)
+
+- [Atomic Test #30 - Windows HideSCAVolume Group Policy Feature](#atomic-test-30---windows-hidescavolume-group-policy-feature)
+
@@ -357,7 +385,7 @@ Remove-ItemProperty "HKLM:\SYSTEM\CurrentControlSet\Control\FileSystem" -Name Lo
## Atomic Test #9 - Disable Windows Registry Tool
Modify the registry of the currently logged in user using reg.exe via cmd console to disable the windows registry tool to prevent user modifying registry entry.
-See example how Agent Tesla malware abuse this technique: https://any.run/report/ea4ea08407d4ee72e009103a3b77e5a09412b722fdef67315ea63f22011152af/a866d7b1-c236-4f26-a391-5ae32213dfc4#registry
+See example how Agent Tesla malware abuses this technique: https://any.run/report/ea4ea08407d4ee72e009103a3b77e5a09412b722fdef67315ea63f22011152af/a866d7b1-c236-4f26-a391-5ae32213dfc4#registry
**Supported Platforms:** Windows
@@ -390,7 +418,7 @@ reg delete HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\policies\
## Atomic Test #10 - Disable Windows CMD application
Modify the registry of the currently logged in user using reg.exe via cmd console to disable the windows CMD application.
-See example how Agent Tesla malware abuse this technique: https://any.run/report/ea4ea08407d4ee72e009103a3b77e5a09412b722fdef67315ea63f22011152af/a866d7b1-c236-4f26-a391-5ae32213dfc4#registry
+See example how Agent Tesla malware abuses this technique: https://any.run/report/ea4ea08407d4ee72e009103a3b77e5a09412b722fdef67315ea63f22011152af/a866d7b1-c236-4f26-a391-5ae32213dfc4#registry
**Supported Platforms:** Windows
@@ -423,7 +451,7 @@ reg delete "HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System" /v "Di
## Atomic Test #11 - Disable Windows Task Manager application
Modify the registry of the currently logged in user using reg.exe via cmd console to disable the windows task manager application.
-See example how Agent Tesla malware abuse this technique: https://any.run/report/ea4ea08407d4ee72e009103a3b77e5a09412b722fdef67315ea63f22011152af/a866d7b1-c236-4f26-a391-5ae32213dfc4#registry
+See example how Agent Tesla malware abuses this technique: https://any.run/report/ea4ea08407d4ee72e009103a3b77e5a09412b722fdef67315ea63f22011152af/a866d7b1-c236-4f26-a391-5ae32213dfc4#registry
**Supported Platforms:** Windows
@@ -456,7 +484,7 @@ reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies
## Atomic Test #12 - Disable Windows Notification Center
Modify the registry of the currently logged in user using reg.exe via cmd console to disable the windows notification center.
-See how remcos rat abuse this technique- https://tccontre.blogspot.com/2020/01/remcos-rat-evading-windows-defender-av.html
+See how remcos rat abuses this technique- https://tccontre.blogspot.com/2020/01/remcos-rat-evading-windows-defender-av.html
**Supported Platforms:** Windows
@@ -489,7 +517,7 @@ reg delete HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\Explorer /v Dis
## Atomic Test #13 - Disable Windows Shutdown Button
Modify the registry of the currently logged in user using reg.exe via cmd console to disable the windows shutdown button.
-See how ransomware abuse this technique- https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.msil.screenlocker.a/
+See how ransomware abuses this technique- https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.msil.screenlocker.a/
**Supported Platforms:** Windows
@@ -522,7 +550,7 @@ reg delete "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policie
## Atomic Test #14 - Disable Windows LogOff Button
Modify the registry of the currently logged in user using reg.exe via cmd console to disable the windows logoff button.
-See how ransomware abuse this technique- https://www.trendmicro.com/vinfo/be/threat-encyclopedia/search/js_noclose.e/2
+See how ransomware abuses this technique- https://www.trendmicro.com/vinfo/be/threat-encyclopedia/search/js_noclose.e/2
**Supported Platforms:** Windows
@@ -557,7 +585,7 @@ reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies
## Atomic Test #15 - Disable Windows Change Password Feature
Modify the registry of the currently logged in user using reg.exe via cmd console to disable the windows change password feature.
-See how ransomware abuse this technique- https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom_heartbleed.thdobah
+See how ransomware abuses this technique- https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom_heartbleed.thdobah
**Supported Platforms:** Windows
@@ -590,7 +618,7 @@ reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies
## Atomic Test #16 - Disable Windows Lock Workstation Feature
Modify the registry of the currently logged in user using reg.exe via cmd console to disable the windows Lock workstation feature.
-See how ransomware abuse this technique- https://www.bleepingcomputer.com/news/security/in-dev-ransomware-forces-you-do-to-survey-before-unlocking-computer/
+See how ransomware abuses this technique- https://www.bleepingcomputer.com/news/security/in-dev-ransomware-forces-you-do-to-survey-before-unlocking-computer/
**Supported Platforms:** Windows
@@ -618,4 +646,480 @@ reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies
+
+
+
+## Atomic Test #17 - Activate Windows NoDesktop Group Policy Feature
+Modify the registry of the currently logged in user using reg.exe via cmd console to hide all icons on Desktop Group Policy.
+Take note that some Group Policy changes might require a restart to take effect.
+See how Trojan abuses this technique- https://www.sophos.com/de-de/threat-center/threat-analyses/viruses-and-spyware/Troj~Krotten-N/detailed-analysis
+
+**Supported Platforms:** Windows
+
+
+**auto_generated_guid:** 93386d41-525c-4a1b-8235-134a628dee17
+
+
+
+
+
+
+#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
+
+
+```cmd
+reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoDesktop /t REG_DWORD /d 1 /f
+```
+
+#### Cleanup Commands:
+```cmd
+reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoDesktop /f >nul 2>&1
+```
+
+
+
+
+
+
+
+
+## Atomic Test #18 - Activate Windows NoRun Group Policy Feature
+Modify the registry of the currently logged in user using reg.exe via cmd console to Remove Run menu from Start Menu Group Policy.
+Take note that some Group Policy changes might require a restart to take effect.
+See how Trojan abuses this technique- https://www.sophos.com/de-de/threat-center/threat-analyses/viruses-and-spyware/Troj~Krotten-N/detailed-analysis
+
+**Supported Platforms:** Windows
+
+
+**auto_generated_guid:** d49ff3cc-8168-4123-b5b3-f057d9abbd55
+
+
+
+
+
+
+#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
+
+
+```cmd
+reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoRun /t REG_DWORD /d 1 /f
+```
+
+#### Cleanup Commands:
+```cmd
+reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoRun /f
+```
+
+
+
+
+
+
+
+
+## Atomic Test #19 - Activate Windows NoFind Group Policy Feature
+Modify the registry of the currently logged in user using reg.exe via cmd console to Remove Search menu from Start Menu Group Policy.
+Take note that some Group Policy changes might require a restart to take effect.
+See how Trojan abuses this technique- https://www.sophos.com/de-de/threat-center/threat-analyses/viruses-and-spyware/Troj~Krotten-N/detailed-analysis
+
+**Supported Platforms:** Windows
+
+
+**auto_generated_guid:** ffbb407e-7f1d-4c95-b22e-548169db1fbd
+
+
+
+
+
+
+#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
+
+
+```cmd
+reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoFind /t REG_DWORD /d 1 /f
+```
+
+#### Cleanup Commands:
+```cmd
+reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoFind /f >nul 2>&1
+```
+
+
+
+
+
+
+
+
+## Atomic Test #20 - Activate Windows NoControlPanel Group Policy Feature
+Modify the registry of the currently logged in user using reg.exe via cmd console to Disable Control Panel Group Policy.
+Take note that some Group Policy changes might require a restart to take effect.
+See how Trojan abuses this technique- https://www.sophos.com/de-de/threat-center/threat-analyses/viruses-and-spyware/Troj~Krotten-N/detailed-analysis
+
+**Supported Platforms:** Windows
+
+
+**auto_generated_guid:** a450e469-ba54-4de1-9deb-9023a6111690
+
+
+
+
+
+
+#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
+
+
+```cmd
+reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoControlPanel /t REG_DWORD /d 1 /f
+```
+
+#### Cleanup Commands:
+```cmd
+reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoControlPanel /f >nul 2>&1
+```
+
+
+
+
+
+
+
+
+## Atomic Test #21 - Activate Windows NoFileMenu Group Policy Feature
+Modify the registry of the currently logged in user using reg.exe via cmd console to Remove File menu from Windows Explorer Group Policy.
+Take note that some Group Policy changes might require a restart to take effect.
+See how Trojan abuses this technique- https://www.sophos.com/de-de/threat-center/threat-analyses/viruses-and-spyware/Troj~Krotten-N/detailed-analysis
+
+**Supported Platforms:** Windows
+
+
+**auto_generated_guid:** 5e27bdb4-7fd9-455d-a2b5-4b4b22c9dea4
+
+
+
+
+
+
+#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
+
+
+```cmd
+reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoFileMenu /t REG_DWORD /d 1 /f
+```
+
+#### Cleanup Commands:
+```cmd
+reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoFileMenu /f >nul 2>&1
+```
+
+
+
+
+
+
+
+
+## Atomic Test #22 - Activate Windows NoClose Group Policy Feature
+Modify the registry of the currently logged in user using reg.exe via cmd console to Disable and remove the Shut Down command Group Policy.
+Take note that some Group Policy changes might require a restart to take effect.
+See how Trojan abuses this technique- https://www.sophos.com/de-de/threat-center/threat-analyses/viruses-and-spyware/Troj~Krotten-N/detailed-analysis
+
+**Supported Platforms:** Windows
+
+
+**auto_generated_guid:** 12f50e15-dbc6-478b-a801-a746e8ba1723
+
+
+
+
+
+
+#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
+
+
+```cmd
+reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoClose /t REG_DWORD /d 1 /f
+```
+
+#### Cleanup Commands:
+```cmd
+reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoClose /f >nul 2>&1
+```
+
+
+
+
+
+
+
+
+## Atomic Test #23 - Activate Windows NoSetTaskbar Group Policy Feature
+Modify the registry of the currently logged in user using reg.exe via cmd console to Disable changes to Taskbar and Start Menu Settings Group Policy.
+Take note that some Group Policy changes might require a restart to take effect.
+See how ransomware abuses this technique- https://www.virustotal.com/gui/file/2d7855bf6470aa323edf2949b54ce2a04d9e38770f1322c3d0420c2303178d91/details
+
+**Supported Platforms:** Windows
+
+
+**auto_generated_guid:** d29b7faf-7355-4036-9ed3-719bd17951ed
+
+
+
+
+
+
+#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
+
+
+```cmd
+reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoSetTaskbar /t REG_DWORD /d 1 /f
+```
+
+#### Cleanup Commands:
+```cmd
+reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoSetTaskbar /f >nul 2>&1
+```
+
+
+
+
+
+
+
+
+## Atomic Test #24 - Activate Windows NoTrayContextMenu Group Policy Feature
+Modify the registry of the currently logged in user using reg.exe via cmd console to Disable context menu for taskbar Group Policy.
+Take note that some Group Policy changes might require a restart to take effect.
+See how ransomware abuses this technique- https://www.virustotal.com/gui/file/2d7855bf6470aa323edf2949b54ce2a04d9e38770f1322c3d0420c2303178d91/details
+
+**Supported Platforms:** Windows
+
+
+**auto_generated_guid:** 4d72d4b1-fa7b-4374-b423-0fe326da49d2
+
+
+
+
+
+
+#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
+
+
+```cmd
+reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v StartMenuLogOff /t REG_DWORD /d 1 /f
+```
+
+#### Cleanup Commands:
+```cmd
+reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoTrayContextMenu /f >nul 2>&1
+```
+
+
+
+
+
+
+
+
+## Atomic Test #25 - Activate Windows NoPropertiesMyDocuments Group Policy Feature
+Modify the registry of the currently logged in user using reg.exe via cmd console to hide Properties from "My Documents icon" Group Policy.
+Take note that some Group Policy changes might require a restart to take effect.
+See how ransomware abuses this technique- https://www.virustotal.com/gui/file/2d7855bf6470aa323edf2949b54ce2a04d9e38770f1322c3d0420c2303178d91/details
+
+**Supported Platforms:** Windows
+
+
+**auto_generated_guid:** 20fc9daa-bd48-4325-9aff-81b967a84b1d
+
+
+
+
+
+
+#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
+
+
+```cmd
+reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoPropertiesMyDocuments /t REG_DWORD /d 1
+```
+
+#### Cleanup Commands:
+```cmd
+reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoPropertiesMyDocuments /f >nul 2>&1
+```
+
+
+
+
+
+
+
+
+## Atomic Test #26 - Hide Windows Clock Group Policy Feature
+Modify the registry of the currently logged in user using reg.exe via cmd console to Hide Clock Group Policy.
+Take note that some Group Policy changes might require a restart to take effect.
+See how ransomware abuses this technique- https://www.virustotal.com/gui/file/2d7855bf6470aa323edf2949b54ce2a04d9e38770f1322c3d0420c2303178d91/details
+
+**Supported Platforms:** Windows
+
+
+**auto_generated_guid:** 8023db1e-ad06-4966-934b-b6a0ae52689e
+
+
+
+
+
+
+#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
+
+
+```cmd
+reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v HideClock /t REG_DWORD /d 1 /f
+```
+
+#### Cleanup Commands:
+```cmd
+reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v HideClock /f >nul 2>&1
+```
+
+
+
+
+
+
+
+
+## Atomic Test #27 - Windows HideSCAHealth Group Policy Feature
+Modify the registry of the currently logged in user using reg.exe via cmd console to remove security and maintenance icon Group Policy.
+Take note that some Group Policy changes might require a restart to take effect.
+See how ransomware abuses this technique- https://www.virustotal.com/gui/file/2d7855bf6470aa323edf2949b54ce2a04d9e38770f1322c3d0420c2303178d91/details
+
+**Supported Platforms:** Windows
+
+
+**auto_generated_guid:** a4637291-40b1-4a96-8c82-b28f1d73e54e
+
+
+
+
+
+
+#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
+
+
+```cmd
+reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v HideSCAHealth /t REG_DWORD /d 1 /f
+```
+
+#### Cleanup Commands:
+```cmd
+reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v HideSCAHealth /f >nul 2>&1
+```
+
+
+
+
+
+
+
+
+## Atomic Test #28 - Windows HideSCANetwork Group Policy Feature
+Modify the registry of the currently logged in user using reg.exe via cmd console to remove the networking icon Group Policy.
+Take note that some Group Policy changes might require a restart to take effect.
+See how ransomware abuses this technique- https://www.virustotal.com/gui/file/2d7855bf6470aa323edf2949b54ce2a04d9e38770f1322c3d0420c2303178d91/details
+
+**Supported Platforms:** Windows
+
+
+**auto_generated_guid:** 3e757ce7-eca0-411a-9583-1c33b8508d52
+
+
+
+
+
+
+#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
+
+
+```cmd
+reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v HideSCANetwork /t REG_DWORD /d 1 /f
+```
+
+#### Cleanup Commands:
+```cmd
+reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v HideSCANetwork /f >nul 2>&1
+```
+
+
+
+
+
+
+
+
+## Atomic Test #29 - Windows HideSCAPower Group Policy Feature
+Modify the registry of the currently logged in user using reg.exe via cmd console to remove the battery icon Group Policy.
+Take note that some Group Policy changes might require a restart to take effect.
+See how ransomware abuses this technique- https://www.virustotal.com/gui/file/2d7855bf6470aa323edf2949b54ce2a04d9e38770f1322c3d0420c2303178d91/details
+
+**Supported Platforms:** Windows
+
+
+**auto_generated_guid:** 8d85a5d8-702f-436f-bc78-fcd9119496fc
+
+
+
+
+
+
+#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
+
+
+```cmd
+reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v HideSCAPower /t REG_DWORD /d 1 /f
+```
+
+#### Cleanup Commands:
+```cmd
+reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v HideSCAPower /f >nul 2>&1
+```
+
+
+
+
+
+
+
+
+## Atomic Test #30 - Windows HideSCAVolume Group Policy Feature
+Modify the registry of the currently logged in user using reg.exe via cmd console to remove the volume icon Group Policy.
+Take note that some Group Policy changes might require a restart to take effect..
+See how ransomware abuses this technique- https://www.virustotal.com/gui/file/2d7855bf6470aa323edf2949b54ce2a04d9e38770f1322c3d0420c2303178d91/details
+
+**Supported Platforms:** Windows
+
+
+**auto_generated_guid:** 7f037590-b4c6-4f13-b3cc-e424c5ab8ade
+
+
+
+
+
+
+#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
+
+
+```cmd
+reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v HideSCAVolume /t REG_DWORD /d 1 /f
+```
+
+#### Cleanup Commands:
+```cmd
+reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v HideSCAVolume /f >nul 2>&1
+```
+
+
+
+
+