heroui logo

Shortcut Created in Startup Folder - Windows

Anvilogic Forge

View Source
Summary
The detection rule targets the creation of shortcuts in the Windows startup folder, a common technique used by adversaries to achieve persistence on compromised systems. This behavior is particularly concerning as such shortcuts allow malicious programs to execute with the privileges of the user whenever that user logs in. The logic for detecting this activity is implemented using Splunk queries that look for PowerShell commands which could indicate the creation of these shortcuts. Specifically, it focuses on commands like 'New-Item', 'New-Object', and 'mklink' alongside regex patterns that match the pathway to the startup folder. It captures events associated with PowerShell Execution (Event ID 4104) to compile a list of anomalies involving shortcut creation. By identifying these shortcuts, organizations can respond to potential persistence mechanisms employed by threat actors, specifically noted here is the association with APT28 (also known as Fancy Bear) and the malware known as DarkGate. The rule aids in detecting an important tactic in maintaining persistence and privilege escalation in Windows environments, correlating with techniques outlined in ATT&CK framework T1547.001.
Categories
  • Windows
Data Sources
  • Process
  • File
  • User Account
ATT&CK Techniques
  • T1547.001
Created: 2024-02-09