Uncommon login item persistency was registered or modified

Cortex XDR Analytics Alert Reference by Alert name

Product
Cortex XDR
Last date published
2026-03-10
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

Detector Tags

Generic Persistence Analytics

ATT&CK Tactic

Persistence (TA0003)

ATT&CK Technique

Severity

Informational

Description

An uncommon login item persistence mechanism was registered/modified on the system.

Attacker's Goals

Establish persistent access to the compromised host by registering malicious code.

Investigative actions

  • Analyze the persistency item and determine whether it performs any malicious or suspicious actions.
  • Analyze the registered process and determine whether it performs any malicious or suspicious actions.
  • Check the events generated by the process for potential malicious behavior.

Variations

Uncommon login item persistency was registered or modified by a security testing tool

Synopsis

ATT&CK Tactic

Persistence (TA0003)

ATT&CK Technique

Severity

High

Description

An uncommon login item persistence mechanism was registered/modified on the system by a security testing tool.

Attacker's Goals

Establish persistent access to the compromised host by registering malicious code.

Investigative actions

  • Analyze the persistency item and determine whether it performs any malicious or suspicious actions.
  • Analyze the registered process and determine whether it performs any malicious or suspicious actions.
  • Check the events generated by the process for potential malicious behavior.


Uncommon login item persistency was registered or modified while using osascript

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

An uncommon login item persistence mechanism was registered/modified on the system while using osascript for persistency registration or as a persistency triggered execution.

Attacker's Goals

Establish persistent access to the compromised host by registering malicious code.

Investigative actions

  • Analyze the persistency item and determine whether it performs any malicious or suspicious actions.
  • Analyze the registered process and determine whether it performs any malicious or suspicious actions.
  • Check the events generated by the process for potential malicious behavior.


Uncommon login item persistency was registered or modified by an invalidly signed actor process

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

An uncommon login item persistence mechanism was registered/modified on the system by an invalidly signed actor process.

Attacker's Goals

Establish persistent access to the compromised host by registering malicious code.

Investigative actions

  • Analyze the persistency item and determine whether it performs any malicious or suspicious actions.
  • Analyze the registered process and determine whether it performs any malicious or suspicious actions.
  • Check the events generated by the process for potential malicious behavior.


Uncommon login item persistency was registered or modified by an invalidly signed causality process

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

An uncommon login item persistence mechanism was registered/modified on the system by an invalidly signed causality process.

Attacker's Goals

Establish persistent access to the compromised host by registering malicious code.

Investigative actions

  • Analyze the persistency item and determine whether it performs any malicious or suspicious actions.
  • Analyze the registered process and determine whether it performs any malicious or suspicious actions.
  • Check the events generated by the process for potential malicious behavior.