An uncommon file added to startup-related Registry keys

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent with eXtended Threat Hunting (XTH)

Detection Modules

Detector Tags

ATT&CK Tactic

Persistence (TA0003)

ATT&CK Technique

Boot or Logon Autostart Execution (T1547)

Severity

Informational

Description

An attacker may add a file to the Registry "Run Keys" or the "Winlogon\Userinit" key to cause it to be executed as the user logs in.

Attacker's Goals

Gain persistence using the legitimate Windows registry run key mechanism, which executes files or scripts on user login or computer boot.

Investigative actions

  • Verify if the registered file is malicious.
  • Check if the installing software is a malicious binary or script.

Variations

An uncommon file added to startup-related Registry keys by an unsigned and unpopular CGO process

Synopsis

ATT&CK Tactic

Persistence (TA0003)

ATT&CK Technique

Boot or Logon Autostart Execution (T1547)

Severity

Low

Description

An attacker may add a file to the Registry "Run Keys" or the "Winlogon\Userinit" key to cause it to be executed as the user logs in.

Attacker's Goals

Gain persistence using the legitimate Windows registry run key mechanism, which executes files or scripts on user login or computer boot.

Investigative actions

  • Verify if the registered file is malicious.
  • Check if the installing software is a malicious binary or script.


An uncommon script added to startup-related Registry keys

Synopsis

ATT&CK Tactic

Persistence (TA0003)

ATT&CK Technique

Boot or Logon Autostart Execution (T1547)

Severity

Low

Description

An attacker may add a script to the Registry "Run Keys" or the "Winlogon\Userinit" key to cause it to be executed as the user logs in.

Attacker's Goals

Gain persistence using the legitimate Windows registry run key mechanism, which executes files or scripts on user login or computer boot.

Investigative actions

  • Verify if the registered file is malicious.
  • Check if the installing software is a malicious binary or script.


An uncommon file added to startup-related Registry keys by a commonly known and signed application

Synopsis

ATT&CK Tactic

Persistence (TA0003)

ATT&CK Technique

Boot or Logon Autostart Execution (T1547)

Severity

Low

Description

An attacker may add a file to the Registry "Run Keys" or the "Winlogon\Userinit" key to cause it to be executed as the user logs in.

Attacker's Goals

Gain persistence using the legitimate Windows registry run key mechanism, which executes files or scripts on user login or computer boot.

Investigative actions

  • Verify if the registered file is malicious.
  • Check if the installing software is a malicious binary or script.


An uncommon LOLBIN added to startup-related Registry keys

Synopsis

ATT&CK Tactic

Persistence (TA0003)

ATT&CK Technique

Boot or Logon Autostart Execution (T1547)

Severity

Low

Description

An attacker may add a LOLBIN to the Registry "Run Keys" or the "Winlogon\Userinit" key to cause it to be executed as the user logs in.

Attacker's Goals

Gain persistence using the legitimate Windows registry run key mechanism, which executes files or scripts on user login or computer boot.

Investigative actions

  • Verify if the registered file is malicious.
  • Check if the installing software is a malicious binary or script.