Adversaries may configure system settings to automatically execute a program during system boot or logon to maintain persistence or gain higher-level privileges on compromised systems. Operating systems may have mechanisms for automatically running a program on system boot or account logon.(Citation: Microsoft Run Key)(Citation: MSDN Authentication Packages)(Citation: Microsoft TimeProvider)(Citation: Cylance Reg Persistence Sept 2013)(Citation: Linux Kernel Programming) These mechanisms may include automatically executing programs that are placed in specially designated directories or are referenced by repositories that store configuration information, such as the Windows Registry. An adversary may achieve the same goal by modifying or extending features of the kernel.
Since some boot or logon autostart programs run with higher privileges, an adversary may leverage these to elevate privileges.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
alerts_for_windows_machines | Alerts for Windows Machines | technique_scores | T1547 | Boot or Logon Autostart Execution |
Comments
This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
References
|
linux_auditd_alerts_and_log_analytics_agent_integration | Linux auditd alerts and Log Analytics agent integration | technique_scores | T1547 | Boot or Logon Autostart Execution |
Comments
This control is only relevant for Linux endpoint machines and the only sub-technique relevant for Linux is Kernel Modules and Extensions.
References
|
azure_sentinel | Azure Sentinel | technique_scores | T1547 | Boot or Logon Autostart Execution |
Comments
This control can identify three of this technique's sub-techniques when executed via "Powershell Empire cmdlets seen in command line", but does not address other procedures.
References
|
file_integrity_monitoring | File Integrity Monitoring | technique_scores | T1547 | Boot or Logon Autostart Execution | |
azure_defender_for_app_service | Azure Defender for App Service | technique_scores | T1547 | Boot or Logon Autostart Execution |
Comments
This control only covers one platform and procedure for two of this technique's many sub-techniques, resulting in a Minimal score.
References
|
Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1547.002 | Authentication Package | 6 |
T1547.006 | Kernel Modules and Extensions | 15 |
T1547.008 | LSASS Driver | 8 |
T1547.011 | Plist Modification | 10 |
T1547.010 | Port Monitors | 1 |
T1547.012 | Print Processors | 7 |
T1547.007 | Re-opened Applications | 11 |
T1547.001 | Registry Run Keys / Startup Folder | 4 |
T1547.005 | Security Support Provider | 8 |
T1547.009 | Shortcut Modification | 8 |
T1547.003 | Time Providers | 9 |
T1547.004 | Winlogon Helper DLL | 10 |