Persistence (TA0003)
Sub-technique: T1547.001 - Registry Run Keys / Startup Folder
Objective: Detect persistence mechanisms using registry run keys or startup folders.
Registry Run Key Modifications
DeviceRegistryEvents
| where RegistryKey has_any ("Run", "RunOnce", "Startup")
| project Timestamp, DeviceName, RegistryKey, RegistryValueName, RegistryValueData, InitiatingProcessAccountName, InitiatingProcessFileNamePurpose: Detect modifications to registry run keys.
Startup Folder File Additions
DeviceFileEvents
| where FolderPath endswith "Startup"
| project Timestamp, DeviceName, FileName, FolderPath, ActionType, InitiatingProcessAccountName, InitiatingProcessFolderPath, InitiatingProcessCommandLine, InitiatingProcessParentFileNamePurpose: Monitor new files added to the startup folder.
Detect Registry Changes for Auto-Start Programs
DeviceRegistryEvents
| where RegistryKey has "HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run"
| project Timestamp, DeviceName, RegistryKey, RegistryValueName, RegistryValueDataPurpose: Monitor changes to registry keys that control auto-start programs.
Monitor for Suspicious StartUp Folder Activity
Purpose: Detect suspicious file creation in the startup folder.
Detect DLLs Added to Startup
Purpose: Identify DLL files added to startup folders.
Registry Persistence via RunOnce Key
Purpose: Monitor the RunOnce registry key for persistence.
Detect Hidden Files in Startup Folder
Purpose: Identify hidden files in startup folders.
Monitor Registry Modifications by Non-Admins
Purpose: Detect registry modifications by non-administrative users.
Detect Changes to Windows Startup Programs
Purpose: Monitor for changes to startup programs in the registry.
Monitor Startup Folder for Script Files
Purpose: Detect script files added to startup folders.
Last updated