Detections
- Home
- - Detections
- -DT148
- ID: DT148
- Created: 23rd October 2025
- Updated: 23rd October 2025
- Platform: Windows
- MITRE ATT&CK®: DS0024
- Contributor: The ITM Team
Installed Software via Registry
Three key registry paths can be used to enumerate installed software:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
Registry values of interest include:
DisplayName- the name of the applicationDisplayVersion- the version of the applicationInstallLocation- the location on disk where files related to the application are storedPublisher- the publisher of the application
Sections
| ID | Name | Description |
|---|---|---|
| IF009 | Installing Unapproved Software | A subject installs software onto an organization-managed system without prior approval or outside sanctioned methods (e.g., centralized package management, internal software portals). This behavior spans a spectrum of risk - from seemingly benign installations (e.g., video games, personal browsers, media players) to unauthorized deployment of potentially harmful tools sourced from unvetted repositories or adversarial infrastructure.
The infringement may involve:
While some installations may appear harmless, unapproved software installs can represent a breakdown in configuration control and acceptable use. In high-risk scenarios, such software may introduce remote access mechanisms, data exfiltration capabilities, or other malware. Even benign cases signal behavioral drift, particularly when repeated or ignored, and can contribute to software sprawl, policy erosion, or eventual exploitation. |
| PR003 | Software Installation | A subject may install or attempt to install software that will be used to exfiltrate sensitive data or contravene internal policies. |
| ME002 | Unrestricted Software Installation | A subject can install software on a device without restriction. |
| AF022 | Virtualization | The subject leverages virtualization technologies—including hypervisors and virtual machines—to obscure forensic artifacts, isolate malicious activity, or evade host-based monitoring. By conducting operations within a guest operating system, the subject reduces visibility to host-level security tools and complicates the forensic process by separating volatile and persistent data across system boundaries.
This strategy allows the subject to:
|
| IF009.002 | Inappropriate Software | A subject installs software that is not considered appropriate by the organization. |
| IF009.005 | Anti-Sleep Software | The subject installs or enables software, scripts, or hardware devices designed to prevent systems from automatically locking, logging out, or entering sleep mode. This unauthorized action deliberately subverts security controls intended to protect unattended systems from unauthorized access.
Characteristics
Example ScenarioA subject installs unauthorized anti-sleep software on a corporate laptop to prevent automatic locking during idle periods. As a result, the device remains accessible even when left unattended in unsecured environments such as cafes, airports, or shared workspaces. This action bypasses mandatory screen-lock policies and renders full disk encryption protections ineffective, exposing sensitive organizational data to theft or compromise by malicious third parties who can physically access the unattended device. |
| IF009.006 | Installing Crypto Mining Software | The subject installs and operates unauthorized cryptocurrency mining software on organizational systems, leveraging compute, network, and energy resources for personal financial gain. This activity subverts authorized system use policies, degrades operational performance, increases attack surface, and introduces external control risks.
Characteristics
Example ScenarioA subject installs a customized |
| IF009.001 | Unwanted Software | A subject installs software that is not inherently malicious, but is not wanted, commonly known as “greyware” or “potentially unwanted programs”. |
| AF022.001 | Use of a Virtual Machine | The subject uses a virtual machine (VM) on an organization device to contain artifacts of forensic value within the virtualized environment, preventing them from being written to the host file system. This strategy helps to obscure evidence and complicate forensic investigations. By running a guest operating system within a VM, the subject can potentially evade detection by security agents installed on the host operating system, as these agents may not have visibility into activities occurring within the VM. This adds an additional layer of complexity to forensic analysis, making it more challenging to detect and attribute malicious activities. |
MITRE ATT&CK® Mapping (1)
ATT&CK Enterprise Matrix Version 17.1