T1547 Boot or Logon Autostart Execution

Adversaries may configure system settings to automatically execute a program during system boot or logon to maintain persistence or gain higher-level privileges on compromised systems. Operating systems may have mechanisms for automatically running a program on system boot or account logon.(Citation: Microsoft Run Key)(Citation: MSDN Authentication Packages)(Citation: Microsoft TimeProvider)(Citation: Cylance Reg Persistence Sept 2013)(Citation: Linux Kernel Programming) These mechanisms may include automatically executing programs that are placed in specially designated directories or are referenced by repositories that store configuration information, such as the Windows Registry. An adversary may achieve the same goal by modifying or extending features of the kernel.

Since some boot or logon autostart programs run with higher privileges, an adversary may leverage these to elevate privileges.

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.AA-05.02 Privileged system access Mitigates T1547 Boot or Logon Autostart Execution
Comments
This diagnostic statement protects against Boot or Logon Autostart Execution through the use of privileged account management and the use of multi-factor authentication.
References
    PR.PS-01.07 Cryptographic keys and certificates Mitigates T1547 Boot or Logon Autostart Execution
    Comments
    This diagnostic statement protects against Boot or Logon Autostart Execution through the use of revocation of keys and key management. Employing key protection strategies for key material used for protecting integrity of boot firmware, system images, and using Hardware Security Modules such as TPMs to store those keys, limitations to specific accounts along with access control mechanisms provides protection against adversaries trying to compromise boot or logon autostart execution.
    References
      PR.AA-01.01 Identity and credential management Mitigates T1547 Boot or Logon Autostart Execution
      Comments
      This diagnostic statement protects against Boot or Logon Autostart Execution through the use of hardened access control policies, secure defaults, password complexity requirements, multifactor authentication requirements, and removal of terminated accounts.
      References
        PR.PS-01.08 End-user device protection Mitigates T1547 Boot or Logon Autostart Execution
        Comments
        This diagnostic statement protects against Boot or Logon Autostart Execution through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
        References

          VERIS Mappings

          Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
          action.malware.variety.Password dumper Password dumper (extract credential hashes) related-to T1547 Boot or Logon Autostart Execution
          action.malware.variety.RAM scraper RAM scraper or memory parser (capture data from volatile memory) related-to T1547 Boot or Logon Autostart Execution
          attribute.confidentiality.data_disclosure None related-to T1547 Boot or Logon Autostart Execution
          action.hacking.variety.Abuse of functionality Abuse of functionality. related-to T1547 Boot or Logon Autostart Execution
          action.hacking.variety.Backdoor Hacking action that creates a backdoor for use. related-to T1547 Boot or Logon Autostart Execution
          action.hacking.vector.Backdoor Hacking actions taken through a backdoor. C2 is only used by malware. related-to T1547 Boot or Logon Autostart Execution
          action.malware.variety.Backdoor Malware creates a backdoor capability for hacking. Child of 'RAT' when combined with 'Trojan'. Child of 'Backdoor or C2'. related-to T1547 Boot or Logon Autostart Execution
          action.malware.variety.Backdoor or C2 Malware creates a remote control capability, but it's unclear if it's a backdoor for hacking or C2 for malware. Parent of 'C2' and 'Backdoor'. related-to T1547 Boot or Logon Autostart Execution
          attribute.integrity.variety.Modify configuration Modified configuration or services related-to T1547 Boot or Logon Autostart Execution

          Azure Mappings

          Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
          file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring technique_scores T1547 Boot or Logon Autostart Execution
          Comments
          This control can detect boot or logon autostart execution.
          References
          alerts_for_linux_machines Alerts for Linux Machines technique_scores T1547 Boot or Logon Autostart Execution
          Comments
          This control is only relevant for Linux endpoint machines and the only sub-technique relevant for Linux is Kernel Modules and Extensions.
          References
          alerts_for_windows_machines Alerts for Windows Machines technique_scores T1547 Boot or Logon Autostart Execution
          Comments
          This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
          References
          defender_for_app_service Microsoft Defender for Cloud: Defender for App Service technique_scores T1547 Boot or Logon Autostart Execution

          GCP Mappings

          Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
          google_secops Google Security Operations technique_scores T1547 Boot or Logon Autostart Execution
          Comments
          Google Security Ops is able to trigger an alert based on creation or changes of registry keys and run keys found on Windows platforms. This technique was scored as minimal based on low or uncertain detection coverage factor. https://github.com/chronicle/detection-rules/blob/783e0e5947774785db1c55041b70176deeca6f46/mitre_attack/T1547_001_windows_registry_run_keys_startup_folder.yaral
          References

          ATT&CK Subtechniques

          Technique ID Technique Name Number of Mappings
          T1547.014 Active Setup 2
          T1547.012 Print Processors 12
          T1547.010 Port Monitors 2
          T1547.009 Shortcut Modification 16
          T1547.005 Security Support Provider 9
          T1547.003 Time Providers 14
          T1547.004 Winlogon Helper DLL 19
          T1547.001 Registry Run Keys / Startup Folder 5
          T1547.006 Kernel Modules and Extensions 31
          T1547.002 Authentication Package 8
          T1547.013 XDG Autostart Entries 20
          T1547.007 Re-opened Applications 12
          T1547.008 LSASS Driver 11