heroui logo

Startup Folder Location Modified - Windows

Anvilogic Forge

View Source
Summary
This detection rule is designed to identify unauthorized modifications to the Windows startup folder location via registry changes. Adversaries may exploit startup folders or registry 'run keys' to establish persistence, enabling their malicious programs to execute automatically upon user login. The rule utilizes Splunk queries to monitor Windows Event Logs, specifically looking for Event ID 4688, which indicates process creation events. By filtering these events for any modifications to the registry related to startup folder paths (e.g., 'Windows\CurrentVersion\Explorer\User Shell Folders'), the detection mechanism can flag potential persistence mechanisms employed by threat actors. The relevance of this detection is highlighted by its associations with techniques like T1547.001, which relates to boot or logon autostart execution using registry methods.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1546.002
  • T1547.001
Created: 2024-02-09