heroui logo

Suspicious StartupItem Plist Creation

Elastic Detection Rules

View Source
Summary
The rule titled 'Suspicious StartupItem Plist Creation' aims to detect the creation or modification of the 'StartupParameters.plist' file, a sign of a deprecated persistence mechanism within macOS systems post-Mavericks. Despite being outdated, this mechanism still functions, and its use is highly suspicious as legitimate applications do not rely on it anymore for persistence. The rule utilizes an Elastic Query Language (EQL) query to search for this file in specified directories while excluding known benign processes. A risk score of 73 reflects the severity of this potential threat due to its association with persistence tactics. The investigation guide outlines potential analysis steps to confirm the legitimacy of the detected StartupItem and the response measures needed to remediate any identified threat, including verifying associated scripts, checking logs, and implementing a file integrity monitoring strategy for early threat detection.
Categories
  • macOS
  • Endpoint
Data Sources
  • File
  • Process
ATT&CK Techniques
  • T1037
  • T1037.005
Created: 2026-01-30