{"id":9937,"date":"2024-11-20T10:51:10","date_gmt":"2024-11-20T10:51:10","guid":{"rendered":"\/cybersecurity-blog\/?p=9937"},"modified":"2025-08-07T07:55:05","modified_gmt":"2025-08-07T07:55:05","slug":"6-persistence-mechanisms-in-malware","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/","title":{"rendered":"6 Common Persistence Mechanisms in Malware"},"content":{"rendered":"\n<p>Persistence mechanisms are techniques used by attackers to keep malware active, even after log-offs, reboots, or restarts. In other words, they\u2019re techniques that make malware tougher to detect and even harder to remove once it\u2019s on a system.&nbsp;<\/p>\n\n\n\n<p>Let&#8217;s dive into a few of the common mechanisms attackers use to keep their malware persistent, quietly doing its work in the background.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What\u2019s Persistence in Cybersecurity?&nbsp;<\/h2>\n\n\n\n<p>In cybersecurity, persistence refers to the ability of malware or an attacker to maintain access to a compromised system over time.&nbsp;<\/p>\n\n\n\n<p>A persistence mechanism is a tool or a technique that allows malware or unauthorized users to stay embedded within a system without needing to reinitiate the attack every time the system restarts.\u00a0<\/p>\n\n\n\n<p>For cyber attackers, persistence can be useful for activities like data theft, surveillance, and further spreading of malware.&nbsp;&nbsp;<\/p>\n\n\n\n<p>These mechanisms can be simple, such as adding files to the system&#8217;s startup folder. They also get more complicated, like modifying system registry keys or even embedding code into core system processes<\/p>\n\n\n\n<p>Let\u2019s explore some of the mechanisms, see which of the following are commonly used for malware persistence, and detect them with the help of <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=persistence&amp;utm_term=201124&amp;utm_content=linktolanding\">ANY.RUN\u2019s Interactive Sandbox<\/a>.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Startup Directory Execution&nbsp;&nbsp;<\/h2>\n\n\n\n<p><strong>MITRE ATT&amp;CK ID: T1547.001<\/strong>&nbsp;<\/p>\n\n\n\n<p>One of the go-to techniques for malware persistence is dropping files in the Startup directory.&nbsp;<\/p>\n\n\n\n<p>When a program is placed in the Startup folder on a Windows system, it automatically runs every time the user logs in.&nbsp;&nbsp;<\/p>\n\n\n\n<p>&nbsp;It\u2019s a straightforward, built-in function. Windows lets you put programs there for convenience, so your favorite apps or tools can launch without you having to click anything.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Attackers know this and use it to their advantage to develop Windows persistence techniques. They sneak a malicious file into the Startup folder, so each time the computer boots up, their malware launches too, right along with everything else.\u00a0<\/p>\n\n\n\n<p>Why is this technique effective? Well, most people don\u2019t ever look in their Startup folder, so it\u2019s easy for these files to go unnoticed. Plus, it doesn\u2019t take a lot of effort for malware to blend in here. It just quietly restarts itself with every logon or reboot without raising obvious alarms.&nbsp;<\/p>\n\n\n\n<p>We can observe this persistence mechanism inside the <a href=\"https:\/\/app.any.run\/tasks\/1d05d194-7423-49f6-a0ef-0d964abaad0e\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=persistence&amp;utm_term=201124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">following sandbox session<\/a>. Here, the Snake <a href=\"https:\/\/any.run\/malware-trends\/keylogger\" target=\"_blank\" rel=\"noreferrer noopener\">Keylogger<\/a> malware adds malicious files inside the Startup directory of the Windows system.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"586\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-3-1024x586.png\" alt=\"\" class=\"wp-image-9938\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-3-1024x586.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-3-300x172.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-3-768x440.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-3-1536x879.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-3-2048x1173.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-3-370x212.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-3-270x155.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-3-740x424.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Persistence mechanism technique inside ANY.RUN sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>To see this in the ANY.RUN sandbox, check the <strong><a href=\"https:\/\/any.run\/cybersecurity-blog\/process-tree-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">Process Tree<\/a><\/strong> on the right side of the screen, where you\u2019ll find the malware\u2019s actions demonstrated.&nbsp;<\/p>\n\n\n\n<p>Click on it to get further details.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"674\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-4-1024x674.png\" alt=\"\" class=\"wp-image-9940\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-4-1024x674.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-4-300x198.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-4-768x506.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-4-370x244.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-4-270x178.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-4-740x487.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-4.png 1063w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>File execution in Startup folder<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>In this case, the file is created in the following location <em>C:\\Users\\admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup<\/em>, which is the Startup folder on a Windows system.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nAnalyze <span class=\"highlight\">malware and phishing<\/span> in ANY.RUN&#8217;s Sandbox&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=persistence&#038;utm_term=201124&#038;utm_content=linktodemo\/\" rel=\"noopener\" target=\"_blank\">\nTry free for 14 days\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">2. Registry Autorun Key Modification&nbsp;&nbsp;<\/h2>\n\n\n\n<p><strong>MITRE ATT&amp;CK ID: T1547.001<\/strong>&nbsp;<\/p>\n\n\n\n<p>Creating files in the Startup directory is a simpler approach. It doesn\u2019t require any changes to the system\u2019s registry or deep permissions, and it\u2019s a method users could technically spot by checking their Startup folder.&nbsp;&nbsp;<\/p>\n\n\n\n<p>On the other hand, Registry Autorun key modification dives a bit deeper. By creating or modifying specific registry keys, malware can make sure it runs automatically every time the system starts.&nbsp;<\/p>\n\n\n\n<p>Malware achieves this type of persistence by altering the registry keys in one of ASEPs (AutoStart Extension Points).&nbsp;<\/p>\n\n\n\n<p>Malware targeting user-level persistence will typically modify these registry keys:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>But this is not all. If the malware gains admin privilege it can access and alter system-level registry keys:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\RunOnce&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\Run&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>In the following <a href=\"https:\/\/app.any.run\/tasks\/943fc8a5-a967-4037-84d9-f1d8e2b62361\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=persistence&amp;utm_term=201124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">analysis session<\/a>, <a href=\"https:\/\/any.run\/malware-trends\/njrat\" target=\"_blank\" rel=\"noreferrer noopener\">Njrat<\/a>&nbsp;changes the registry key at the User level: HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"624\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-6-1024x624.png\" alt=\"\" class=\"wp-image-9941\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-6-1024x624.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-6-300x183.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-6-768x468.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-6-370x225.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-6-270x164.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-6-740x451.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-6.png 1062w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Autorun value change in registry<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">3. Logon\/Logoff Helper Path Modification&nbsp;&nbsp;<\/h2>\n\n\n\n<p><strong>MITRE ATT&amp;CK ID: T1547.004<\/strong>&nbsp;<\/p>\n\n\n\n<p>Windows has built-in \u201chelper\u201d paths in the registry that handle tasks during login and logoff. They\u2019re meant to run specific programs or scripts to assist with the user\u2019s session start or end, like running a script that sets up a network drive when you log in.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Attackers know this, and they\u2019ve figured out that by tweaking these paths, they can set up their malware to launch every time someone logs in or out of the system.&nbsp;<\/p>\n\n\n\n<p>How does it work? By altering registry keys that manage these login\/logoff helpers, like the ones in <em>HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon<\/em>, malware can slip itself into the sequence of programs that automatically run during these key moments.&nbsp;&nbsp;<\/p>\n\n\n\n<p>This means every time you log in, the malware gets a fresh start without needing to infect the system repeatedly.&nbsp;<\/p>\n\n\n\n<p>For instance, the following <a href=\"https:\/\/app.any.run\/tasks\/58f81c62-2af3-440a-a386-6f886244292a\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=persistence&amp;utm_term=201124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">analysis session<\/a> shows how malware uses this technique to achieve persistence.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"590\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-4-1024x590.png\" alt=\"\" class=\"wp-image-9942\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-4-1024x590.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-4-300x173.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-4-768x442.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-4-1536x884.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-4-370x213.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-4-270x155.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-4-740x426.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-4.png 1900w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Registry key change inside ANY.RUN virtual machine<\/em><\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">4. Kernel Modules and Extensions (Linux)&nbsp;&nbsp;<\/h2>\n\n\n\n<p><strong>MITRE ATT&amp;CK ID: T1547.006<\/strong>&nbsp;<\/p>\n\n\n\n<p>In Linux, the kernel, the core part of the operating system, is responsible for handling essential functions like managing system resources and hardware interactions.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Kernel modules are pieces of code that can be loaded and run within the kernel to extend its capabilities, like adding support for new hardware.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Normally, these modules are legitimate and provide helpful functions, but attackers have found a way to use them to their advantage.&nbsp;<\/p>\n\n\n\n<p>Here\u2019s how these malware persistence techniques work.\u00a0<\/p>\n\n\n\n<p><strong>Loading the malicious module<\/strong>&nbsp;<\/p>\n\n\n\n<p>Malware can install a malicious kernel module, giving it the ability to load directly into the kernel.&nbsp;&nbsp;<\/p>\n\n\n\n<p>To achieve this, malware usually requires root (administrator) privileges. Once these privileges are obtained, the malware can use commands like insmod, modprobe, or depmod to load the malicious module into the kernel.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/3597df1c-2311-47b5-9420-4f0e9eb31907\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=persistence&amp;utm_term=201124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View malware analysis<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"502\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image5-3-1024x502.png\" alt=\"\" class=\"wp-image-9943\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image5-3-1024x502.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image5-3-300x147.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image5-3-768x377.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image5-3-370x182.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image5-3-270x132.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image5-3-740x363.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image5-3.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Loading of malicious module detected by ANY.RUN sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p><strong>Maintaining high privilege access<\/strong>&nbsp;<\/p>\n\n\n\n<p>Since kernel modules run in kernel space, the malware operates with high privilege levels, which means it has almost unrestricted access to system resources.&nbsp;&nbsp;<\/p>\n\n\n\n<p>This includes access to the network stack, filesystem, memory, and hardware devices, which allows it to monitor or intercept communications, manipulate data, and hide its presence.&nbsp;<\/p>\n\n\n\n<p><strong>Stealth and evasion<\/strong>&nbsp;<\/p>\n\n\n\n<p>It\u2019s a highly stealthy technique because, once loaded, the malware becomes part of the core system functions.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Once loaded, the malicious module can camouflage itself by removing signs of its presence, like clearing log entries or hooking into kernel functions to hide processes or files. Since standard antivirus and security tools operate at the user level, they often can\u2019t detect or interact with kernel-level threats.&nbsp;<\/p>\n\n\n\n<!-- CTA Split START -->\n<div class=\"cta-split\">\n<div class=\"cta__split-left\">\n\n<!-- Image -->\n<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/mcusercontent.com\/663b94f19348582a8dc323efe\/images\/0d88188b-3e89-2314-5a60-cb87e8077326.png\" alt=\"Learn to analyze malware in a sandbox\" class=\"cta__split-icon\" \/>\n<\/div>\n\n<div class=\"cta__split-right\">\n<div>\n\n<!-- Heading -->\n<h3 class=\"cta__split-heading\"><br>Learn to analyze cyber threats<\/h3>\n\n<!-- Text -->\n<p class=\"cta__split-text\">\nSee a detailed guide to using ANY.RUN&#8217;s <span class=\"highlight\">Interactive Sandbox<\/span> for malware and phishing analysis\n<br \/>\n<br \/>\n<\/p>\n<\/div>\n<!-- CTA Link -->\n<a target=\"_blank\" rel=\"noopener\" id=\"article-banner-split\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-in-a-sandbox\/\"><div class=\"cta__split-link\">Read full guide<\/div><\/a>\n<\/div>\n<\/div>\n<!-- CTA Split END -->\n<!-- CTA Split Styles START -->\n<style>\n.cta-split {\noverflow: hidden;\nmargin: 3rem 0;\ndisplay: grid;\njustify-items: center;\nborder-radius: 0.5rem;\nwidth: 100%;\nmin-height: 25rem;\ngrid-template-columns: repeat(2, 1fr);\nborder: 1px solid rgba(75, 174, 227, 0.32);\nfont-family: 'Catamaran Bold';\n}\n\n.cta__split-left {\ndisplay: flex;\nalign-items: center;\njustify-content: center;\nheight: 100%;\nwidth: 100%;\nbackground-color: #161c59;\nbackground-position: center center;\nbackground: rgba(32, 168, 241, 0.1);\n}\n\n.cta__split-icon { \nwidth: 100%;\nheight: auto;\nobject-fit: contain;\nmax-width: 100%;\n}\n\n.cta__split-right {\ndisplay: flex;\nflex-direction: column;\njustify-content: space-between;\npadding: 2rem;\n}\n\n.cta__split-heading { font-size: 1.5rem; }\n\n.cta__split-text {\nmargin-top: 1rem;\nfont-family: Lato, Roboto, sans-serif;\n}\n\n.cta__split-link {\npadding: 0.5rem 1rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: white;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\ndisplay: block;\nz-index: 1000;\nposition: relative;\ncursor: pointer !important;\n}\n\n.cta__split-link:hover {\nbackground-color: #68CBFF;\ncolor: white;\ncursor: pointer;\n}\n\n.highlight { color: #ea2526;}\n\n\n\/* Mobile styles START *\/\n@media only screen and (max-width: 768px) {\n\n.cta-split {\ngrid-template-columns: 1fr;\nmin-height: auto;\n}\n\n.cta__split-left {\nheight: auto;\nmin-height: 10rem;\n}\n\n\n.cta__split-left, .cta__split-right {\nheight: auto;\n}\n\n.cta__split-heading { font-size: 1.2rem; }\n\n.cta__split-text { font-size: 1rem; }\n.cta__split-icon {\nmax-height: auto;\nobject-fit: cover;\n}\n\n}\n\/* Mobile styles END *\/\n<\/style>\n<!-- CTA Split Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">5. Office Application Startup&nbsp;&nbsp;<\/h2>\n\n\n\n<p><strong>MITRE ATT&amp;CK ID: T1137<\/strong>&nbsp;<\/p>\n\n\n\n<p>Microsoft Office applications, like Word or Excel, have certain startup files or templates they load whenever you open them. Attackers know that Office is used widely, especially in workplaces, so they take advantage of this feature to get their malware up and running whenever someone opens an Office app.&nbsp;<\/p>\n\n\n\n<p>Office offers various mechanisms that attackers can manipulate to ensure their malware relaunches every time an Office application starts up.&nbsp;<\/p>\n\n\n\n<p>Two common methods for achieving persistence in Office applications include:&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Office template macros<\/strong>: Attackers can embed <a href=\"https:\/\/any.run\/cybersecurity-blog\/macros-in-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">malicious macros<\/a> in Office template files. These templates are automatically loaded each time the application is opened, which means the embedded malicious code is executed without additional prompts or interaction from the user.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>Add-ins<\/strong>: Microsoft Office allows users to install add-ins\u2014mini applications that extend Office functionality. Attackers can create malicious add-ins and place them in Office\u2019s add-in directories. When the infected add-in is installed, it loads alongside the Office application, providing another layer of persistence that activates whenever the application starts.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>In the following <a href=\"https:\/\/app.any.run\/tasks\/d21e760f-2514-49b5-a223-01c8ca9e1695\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=persistence&amp;utm_term=201124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">malware analysis session<\/a>, the attackers used a macro to achieve persistence in Office applications. It\u2019s immediately detected by the ANY.RUN sandbox:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"351\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image6-3-1024x351.png\" alt=\"\" class=\"wp-image-9944\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image6-3-1024x351.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image6-3-300x103.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image6-3-768x263.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image6-3-370x127.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image6-3-270x92.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image6-3-740x253.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image6-3.png 1156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Macros detected by ANY.RUN sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The infected Office file in displayed inside the virtual machine:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"541\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image7-5-1024x541.png\" alt=\"\" class=\"wp-image-9945\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image7-5-1024x541.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image7-5-300x159.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image7-5-768x406.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image7-5-1536x812.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image7-5-370x196.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image7-5-270x143.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image7-5-740x391.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image7-5.png 1918w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>The malicious Office file<\/em><\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">6. Boot or Logon Initialization Scripts&nbsp;<\/h2>\n\n\n\n<p><strong>MITRE ATT&amp;CK ID: T1037<\/strong>&nbsp;<\/p>\n\n\n\n<p>Adversaries often leverage scripts that automatically run during system boot or user logon to establish persistence. These <em>initialization scripts<\/em> are typically used for administrative tasks, like launching other programs or sending logs to an internal server. Because of this, they\u2019re a convenient target for attackers looking to maintain a foothold on a system.&nbsp;<\/p>\n\n\n\n<p>The details of these scripts vary by operating system and setup\u2014they can be applied either locally on a single machine or across multiple systems in a network. By modifying these scripts, attackers ensure their malware executes at every startup or login, keeping it active without requiring user interaction.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"578\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image8-4-1024x578.png\" alt=\"\" class=\"wp-image-9947\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image8-4-1024x578.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image8-4-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image8-4-768x434.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image8-4-370x209.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image8-4-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image8-4-740x418.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image8-4.png 1186w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>RC scripts modified inside ANY.RUN sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>In the example above, attackers modified RC scripts to achieve persistence in the system.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Detect Persistence Mechanisms Quickly in ANY.RUN Sandbox&nbsp;<\/h2>\n\n\n\n<p>To spot persistence mechanisms used by attackers, ANY.RUN integrates the <a href=\"https:\/\/any.run\/cybersecurity-blog\/mitre-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE ATT&amp;CK Matrix<\/a> framework.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"375\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image9-2-1024x375.png\" alt=\"\" class=\"wp-image-9948\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image9-2-1024x375.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image9-2-300x110.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image9-2-768x282.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image9-2-1536x563.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image9-2-2048x751.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image9-2-370x136.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image9-2-270x99.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image9-2-740x271.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Persistence mechanisms detected inside sandbox<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>Simply click the <strong>ATT&amp;CK<\/strong> button on the right side of the screen, and ANY.RUN sandbox will display all the techniques and sub-techniques observed in that specific analysis session, making it fast and easy to see exactly what\u2019s in play.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Attackers use various methods to keep malware persistence on infected systems. These methods range from simple, like putting malicious files in the Startup directory, to complex, such as changing registry keys or targeting kernel modules. Each technique uses built-in system features to avoid detection and stay in control. With ANY.RUN\u2019s Interactive Sandbox you can identify a persistence method and put it into a larger context of the attack, seeing how it plays out at every stage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies persistent malware analysis that targets both Windows, Android, and Linux systems. Our threat intelligence products, <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA Search<\/a> and <a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find <a href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">IOCs<\/a> or files to learn more about the threats and respond to incidents faster.\u00a0\u00a0<\/p>\n\n\n\n<p><strong>With ANY.RUN you can:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detect malware in seconds<\/li>\n\n\n\n<li>Interact with samples in real time<\/li>\n\n\n\n<li>Save time and money on sandbox setup and maintenance<\/li>\n\n\n\n<li>Record and study all aspects of malware behavior<\/li>\n\n\n\n<li>Collaborate with your team&nbsp;<\/li>\n\n\n\n<li>Scale as you need<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=persistence&amp;utm_term=201124&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Request free trial of ANY.RUN&#8217;s products \u2192<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Persistence mechanisms are techniques used by attackers to keep malware active, even after log-offs, reboots, or restarts. In other words, they\u2019re techniques that make malware tougher to detect and even harder to remove once it\u2019s on a system.&nbsp; Let&#8217;s dive into a few of the common mechanisms attackers use to keep their malware persistent, quietly [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":9951,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[57,10,34,40],"class_list":["post-9937","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","tag-anyrun","tag-cybersecurity","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>6 Common Persistence Mechanisms in Malware - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Learn about the most common mechanisms attackers use to keep their malware persistent on infected systems.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"6 Common Persistence Mechanisms in Malware\",\"datePublished\":\"2024-11-20T10:51:10+00:00\",\"dateModified\":\"2025-08-07T07:55:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/\"},\"wordCount\":1871,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"Cybersecurity Lifehacks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/\",\"name\":\"6 Common Persistence Mechanisms in Malware - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2024-11-20T10:51:10+00:00\",\"dateModified\":\"2025-08-07T07:55:05+00:00\",\"description\":\"Learn about the most common mechanisms attackers use to keep their malware persistent on infected systems.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Lifehacks\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"6 Common Persistence Mechanisms in Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 Common Persistence Mechanisms in Malware - ANY.RUN&#039;s Cybersecurity Blog","description":"Learn about the most common mechanisms attackers use to keep their malware persistent on infected systems.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"6 Common Persistence Mechanisms in Malware","datePublished":"2024-11-20T10:51:10+00:00","dateModified":"2025-08-07T07:55:05+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/"},"wordCount":1871,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis","malware behavior"],"articleSection":["Cybersecurity Lifehacks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/","url":"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/","name":"6 Common Persistence Mechanisms in Malware - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-11-20T10:51:10+00:00","dateModified":"2025-08-07T07:55:05+00:00","description":"Learn about the most common mechanisms attackers use to keep their malware persistent on infected systems.\u00a0","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Lifehacks","item":"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/"},{"@type":"ListItem","position":3,"name":"6 Common Persistence Mechanisms in Malware"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/9937"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=9937"}],"version-history":[{"count":22,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/9937\/revisions"}],"predecessor-version":[{"id":15343,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/9937\/revisions\/15343"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/9951"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=9937"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=9937"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=9937"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}