Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Swarmer Tool Evading EDR With a Stealthy Modification on Windows Registry for Persistence

Swarmer Tool Evading EDR With a Stealthy Modification on Windows Registry for Persistence

Posted on January 29, 2026January 29, 2026 By CWS

Praetorian Inc. has publicly launched Swarmer, a instrument enabling low-privilege attackers to realize stealthy Home windows registry persistence by sidestepping Endpoint Detection and Response (EDR) monitoring.

Deployed operationally since February 2025, Swarmer exploits obligatory consumer profiles and the obscure Offline Registry API to switch the NTUSER hive with out triggering customary registry hooks.

Conventional registry persistence by way of HKCUSOFTWAREMicrosoftWindowsCurrentVersionRun keys is well detected. EDR instruments hook APIs like RegSetValue, logging, and flagging modifications.

Swarmer bypasses this by leveraging obligatory consumer profiles, a legacy Home windows function for enterprise profile enforcement.

In obligatory profiles, NTUSER.MAN overrides the usual NTUSER.DAT hive in %USERPROFILE% at login. Low-privilege customers can create NTUSER.MAN by copying and renaming NTUSER.DAT.

Nonetheless, enhancing the loaded hive requires customary APIs, alerting EDR. Swarmer solves this utilizing Offreg.dll, Microsoft’s Offline Registry Library, designed for offline hive manipulation throughout setup or forensics.

Microsoft warns in opposition to bypassing registry safety with Offreg, however Swarmer ignores this.

Features like ORCreateHive, OROpenHive, ORCreateKey, ORSetValue, and ORSaveHive permit full hive development with out Reg* API calls, evading Course of Monitor, ETW, and most EDR behavioral analytics, praetorian mentioned.

Swarmer Workflow and Implementation

Swarmer’s workflow is environment friendly:

Export HKCU by way of reg export or TrustedSec’s reg_query Beacon Object File (BOF) to keep away from disk artifacts.

Modify the export (e.g., add Run key entries).

Run Swarmer: swarmer.exe exported.reg NTUSER.MAN or with startup flags: swarmer.exe –startup-key “Updater” –startup-value “C:PathTopayload.exe” exported.reg NTUSER.MAN.

Drop NTUSER.MAN into %USERPROFILE%.

For C2 implants, parse BOF output instantly: swarmer.exe –bof –startup-key “Updater” –startup-value “C:PathTopayload.exe” bof_output.txt NTUSER.MAN.

Inbuilt C# for P/Invoke ease and offline use, Swarmer works as an EXE or PowerShell module:

textImport-Module ‘.swarmer.dll’
Convert-RegToHive -InputPath ‘.exported.reg’ -OutputPath ‘.NTUSER.MAN’

A workaround fixes ORCreateHive’s invalid hive output: RegLoadAppKeyW creates a base hive (non-admin), then Offreg populates it.

FeatureDetailsPlatformsWindows 10/11PrivilegesLow (user-level)EvasionNo Reg* APIs; non-obligatory no-disk BOFPayload TypesRun keys, customized registry mods

Limitations and Detection Alternatives

Swarmer has caveats:

CaveatImpactOne-shotCan’t replace with out admin; profile turns into obligatory, resetting consumer adjustments.Login-requiredActivates solely on logout/login; survives reboots.HKCU-onlyNo HKLM entry.Edge casesPossible login corruption; take a look at first.

Detection contains NTUSER.MAN creation outdoors enterprise instruments, Offreg.dll hundreds in non-standard processes, or profile anomalies. Payload execution at login stays seen obfuscate it.

Defenders ought to monitor consumer profile directories for NTUSER.MAN, baseline Offreg utilization, and profile integrity at login. Swarmer highlights Home windows’ legacy cruft predating trendy EDR.

This disclosure arms blue groups in opposition to obscure persistence, urging scrutiny of Home windows’ dusty corners.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:EDR, Evading, Modification, Persistence, Registry, Stealthy, Swarmer, Tool, Windows

Post navigation

Previous Post: New Semantic Chaining Jailbreak Attack Bypasses Grok 4 and Gemini Nano Security Filters
Next Post: Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks

Related Posts

FBI Captures Contractor for  Million Cryptocurrency Theft FBI Captures Contractor for $46 Million Cryptocurrency Theft Cyber Security News
New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs Cyber Security News
Proton Exposes 300 Million Stolen Credentials Available for Sale on Dark Web Cybercrime Markets Proton Exposes 300 Million Stolen Credentials Available for Sale on Dark Web Cybercrime Markets Cyber Security News
Understanding OWASP Top 10 – Mitigating Web Application Vulnerabilities Understanding OWASP Top 10 – Mitigating Web Application Vulnerabilities Cyber Security News
Best MSP Software: The Essential Tech Stack  Best MSP Software: The Essential Tech Stack  Cyber Security News
New Tool Identifies Quantum-Weak Cryptography New Tool Identifies Quantum-Weak Cryptography Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark