Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
1 Day |
Required Data |
- Requires:
- XDR Agent with eXtended Threat Hunting (XTH)
|
Detection Modules |
|
Detector Tags |
|
ATT&CK Tactic |
Persistence (TA0003) |
ATT&CK Technique |
Boot or Logon Autostart Execution (T1547) |
Severity |
Informational |
Description
An attacker may add a file to the Registry "Run Keys" or the "Winlogon\Userinit" key to cause it to be executed as the user logs in.
Attacker's Goals
Gain persistence using the legitimate Windows registry run key mechanism, which executes files or scripts on user login or computer boot.
Investigative actions
- Verify if the registered file is malicious.
- Check if the installing software is a malicious binary or script.
Variations
An uncommon file added to startup-related Registry keys by an unsigned and unpopular CGO process
Synopsis
Description
An attacker may add a file to the Registry "Run Keys" or the "Winlogon\Userinit" key to cause it to be executed as the user logs in.
Attacker's Goals
Gain persistence using the legitimate Windows registry run key mechanism, which executes files or scripts on user login or computer boot.
Investigative actions
- Verify if the registered file is malicious.
- Check if the installing software is a malicious binary or script.
An uncommon script added to startup-related Registry keys
Synopsis
Description
An attacker may add a script to the Registry "Run Keys" or the "Winlogon\Userinit" key to cause it to be executed as the user logs in.
Attacker's Goals
Gain persistence using the legitimate Windows registry run key mechanism, which executes files or scripts on user login or computer boot.
Investigative actions
- Verify if the registered file is malicious.
- Check if the installing software is a malicious binary or script.
An uncommon file added to startup-related Registry keys by a commonly known and signed application
Synopsis
Description
An attacker may add a file to the Registry "Run Keys" or the "Winlogon\Userinit" key to cause it to be executed as the user logs in.
Attacker's Goals
Gain persistence using the legitimate Windows registry run key mechanism, which executes files or scripts on user login or computer boot.
Investigative actions
- Verify if the registered file is malicious.
- Check if the installing software is a malicious binary or script.
An uncommon LOLBIN added to startup-related Registry keys
Synopsis
Description
An attacker may add a LOLBIN to the Registry "Run Keys" or the "Winlogon\Userinit" key to cause it to be executed as the user logs in.
Attacker's Goals
Gain persistence using the legitimate Windows registry run key mechanism, which executes files or scripts on user login or computer boot.
Investigative actions
- Verify if the registered file is malicious.
- Check if the installing software is a malicious binary or script.