heroui logo

Startup Item File Created - MacOS

Sigma Rules

View Source
Summary
This detection rule identifies the creation of startup item plist files in macOS systems. Startup items are crucial for establishing persistence on a machine, as they execute during the boot process and can run shell scripts or other executables. The detection targets plist files that are stored within specific system directories (i.e., /Library/StartupItems/ and /System/Library/StartupItems/) and ensures that any new files created match the naming convention typical of startup items. The rule is aimed at identifying potential malicious activity, where adversaries may attempt to create these items for persistence after compromising a system. While this rule assists in detecting unauthorized modifications aimed at boot-time execution, it acknowledges the possibility of false positives related to legitimate administrative actions that may inadvertently create or modify startup items.
Categories
  • macOS
  • Endpoint
Data Sources
  • File
ATT&CK Techniques
  • T1037.005
Created: 2020-10-14