Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
|
Detector Tags |
|
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Informational |
Description
An attacker may add a file to the Registry "Run Keys" or the "Winlogon\Userinit" key to cause it to be executed as the user logs in.
Attacker's Goals
Gain persistence using the legitimate Windows registry run key mechanism, which executes files or scripts on user login or computer boot.
Investigative actions
- Verify if the registered file is malicious.
- Check if the installing software is a malicious binary or script.
Variations
An uncommon file added to startup-related Registry keys by an unsigned and unpopular CGO processAn uncommon script added to startup-related Registry keys
An uncommon file added to startup-related Registry keys by a commonly known and signed application
An uncommon LOLBIN added to startup-related Registry keys