
Summary
This detection rule identifies potential persistence mechanisms employed by adversaries through file writes in the Windows startup folder. Specifically, it targets file creations or modifications under the directory '\Microsoft\Windows\Start Menu\Programs\StartUp', where malware may place executable files to ensure they run automatically upon user logon. When a user logs into their account, any program listed in this startup folder will execute with the user's permissions, potentially allowing malicious code to function undetected. The rule utilizes Windows Event ID 4656, which indicates that a handle has been opened to an object such as a file, to detect writes to this critical directory. The filtering criteria exclude specific benign processes known to be part of legitimate Windows operations, thus reducing false positives. The results include timestamps, hostnames, username, process details, and the object name, all crucial for further investigation into suspicious activities related to the startup folder.
Categories
- Windows
- Endpoint
Data Sources
- File
- Windows Registry
- Process
ATT&CK Techniques
- T1547.001
- T1547
Created: 2024-02-09