T1037.005 Startup Items

Adversaries may use startup items automatically executed at boot initialization to establish persistence. Startup items execute during the final phase of the boot process and contain shell scripts or other executable files along with configuration information used by the system to determine the execution order for all startup items.(Citation: Startup Items)

This is technically a deprecated technology (superseded by Launch Daemon), and thus the appropriate folder, <code>/Library/StartupItems</code> isn’t guaranteed to exist on the system by default, but does appear to exist by default on macOS Sierra. A startup item is a directory whose executable and configuration property list (plist), <code>StartupParameters.plist</code>, reside in the top-level directory.

An adversary can create the appropriate folders/files in the StartupItems directory to register their own persistence mechanism.(Citation: Methods of Mac Malware Persistence) Additionally, since StartupItems run during the bootup phase of macOS, they will run as the elevated root user.

View in MITRE ATT&CK®

NIST 800-53 Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CA-07 Continuous Monitoring mitigates T1037.005 Startup Items
CM-06 Configuration Settings mitigates T1037.005 Startup Items
SI-03 Malicious Code Protection mitigates T1037.005 Startup Items
SI-07 Software, Firmware, and Information Integrity mitigates T1037.005 Startup Items
CM-02 Baseline Configuration mitigates T1037.005 Startup Items
SI-04 System Monitoring mitigates T1037.005 Startup Items
AC-03 Access Enforcement mitigates T1037.005 Startup Items

VERIS Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
attribute.integrity.variety.Modify configuration Modified configuration or services related-to T1037.005 Startup Items