Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Silver Fox Deploys ValleyRAT & ABCDoor Via Fake Uses Notices
May 5, 2026
Cerberus Stalkerware Abuses Google Play for Leverages Accessibility
May 5, 2026
Education Sector Under Attack: Espionage & Phishing
May 5, 2026
Home/CyberSecurity News/Swarmer Tool Evades EDR via Stealthy Windows Evading With
CyberSecurity News

Swarmer Tool Evades EDR via Stealthy Windows Evading With

Praetorian Inc. has publicly released Swarmer, a tool designed to enable low-privilege attackers to establish stealthy Windows registry persistence. Swarmer achieves this by sidestepping Endpoint...

Marcus Rodriguez
Marcus Rodriguez
January 29, 2026 2 Min Read
0 0

Praetorian Inc. has publicly released Swarmer, a tool designed to enable low-privilege attackers to establish stealthy Windows registry persistence. Swarmer achieves this by sidestepping Endpoint Detection and Response (EDR) monitoring.

Deployed operationally since February 2025, Swarmer exploits mandatory user profiles and the obscure Offline Registry API to modify the NTUSER hive without triggering standard registry hooks.

Traditional registry persistence via HKCUSOFTWAREMicrosoftWindowsCurrentVersionRun keys is easily detected. EDR tools hook APIs like RegSetValue, logging, and flagging modifications.

Swarmer bypasses this by leveraging mandatory user profiles, a legacy Windows feature for enterprise profile enforcement.

In mandatory profiles, NTUSER.MAN overrides the standard NTUSER.DAT hive in %USERPROFILE% at login. Low-privilege users can create NTUSER.MAN by copying and renaming NTUSER.DAT.

However, editing the loaded hive requires standard APIs, alerting EDR. Swarmer solves this using Offreg.dll, Microsoft’s Offline Registry Library, designed for offline hive manipulation during setup or forensics.

Microsoft warns against bypassing registry security with Offreg, but Swarmer ignores this.

Functions like ORCreateHive, OROpenHive, ORCreateKey, ORSetValue, and ORSaveHive allow full hive construction without Reg* API calls, evading Process Monitor, ETW, and most EDR behavioral analytics, praetorian said.

Swarmer Workflow and Implementation

Swarmer’s workflow is efficient:

  1. Export HKCU via reg export or TrustedSec’s reg_query Beacon Object File (BOF) to avoid disk artifacts.
  2. Modify the export (e.g., add Run key entries).
  3. Run Swarmer: swarmer.exe exported.reg NTUSER.MAN or with startup flags: swarmer.exe --startup-key "Updater" --startup-value "C:PathTopayload.exe" exported.reg NTUSER.MAN.
  4. Drop NTUSER.MAN into %USERPROFILE%.

For C2 implants, parse BOF output directly: swarmer.exe --bof --startup-key "Updater" --startup-value "C:PathTopayload.exe" bof_output.txt NTUSER.MAN.

Built in C# for P/Invoke ease and offline use, Swarmer works as an EXE or PowerShell module:

textImport-Module '.swarmer.dll'
Convert-RegToHive -InputPath '.exported.reg' -OutputPath '.NTUSER.MAN'

A workaround fixes ORCreateHive’s invalid hive output: RegLoadAppKeyW creates a base hive (non-admin), then Offreg populates it.

Feature Details
Platforms Windows 10/11
Privileges Low (user-level)
Evasion No Reg* APIs; optional no-disk BOF
Payload Types Run keys, custom registry mods

Limitations and Detection Opportunities

Swarmer has caveats:

Caveat Impact
One-shot Can’t update without admin; profile becomes mandatory, resetting user changes.
Login-required Activates only on logout/login; survives reboots.
HKCU-only No HKLM access.
Edge cases Possible login corruption; test first.

Detection includes NTUSER.MAN creation outside enterprise tools, Offreg.dll loads in non-standard processes, or profile anomalies. Payload execution at login remains visible obfuscate it.

Defenders should monitor user profile directories for NTUSER.MAN, baseline Offreg usage, and profile integrity at login. Swarmer highlights Windows’ legacy cruft predating modern EDR.

This disclosure arms blue teams against obscure persistence, urging scrutiny of Windows’ dusty corners.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitSecurity

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

CISA Chief Uploaded Sensitive Docs to Public ChatGPT

Next Post

Semantic Chaining Attack Bypasses Grok 4 & Jailbreak Gemini

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Attackers Abuse Amazon SES for Authenticated Ph Send Phishing
May 5, 2026
New Framework Connects APT Campaigns Across All Layers
May 5, 2026
WhatsApp Flaw Uses Instagram Reels for Malicious URL Execution
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us