T1037 Boot or Logon Initialization Scripts Mappings

Adversaries may use scripts automatically executed at boot or logon initialization to establish persistence. Initialization scripts can be used to perform administrative functions, which may often execute other programs or send information to an internal logging server. These scripts can vary based on operating system and whether applied locally or remotely.

Adversaries may use these scripts to maintain persistence on a single system. Depending on the access configuration of the logon scripts, either local credentials or an administrator account may be necessary.

An adversary may also be able to escalate their privileges since some boot or logon initialization scripts run with higher privileges.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
AC-17 Remote Access Protects T1037 Boot or Logon Initialization Scripts
AC-3 Access Enforcement Protects T1037 Boot or Logon Initialization Scripts
CA-7 Continuous Monitoring Protects T1037 Boot or Logon Initialization Scripts
CM-2 Baseline Configuration Protects T1037 Boot or Logon Initialization Scripts
CM-6 Configuration Settings Protects T1037 Boot or Logon Initialization Scripts
CM-7 Least Functionality Protects T1037 Boot or Logon Initialization Scripts
SI-3 Malicious Code Protection Protects T1037 Boot or Logon Initialization Scripts
SI-4 System Monitoring Protects T1037 Boot or Logon Initialization Scripts
SI-7 Software, Firmware, and Information Integrity Protects T1037 Boot or Logon Initialization Scripts
action.hacking.vector.Backdoor or C2 Backdoor or command and control channel related-to T1037 Boot or Logon Initialization Script
action.malware.variety.Backdoor Backdoor (enable remote access). Child of 'RAT' when combined with 'Trojan' related-to T1037 Boot or Logon Initialization Script
attribute.integrity.variety.Modify configuration Modified configuration or services related-to T1037 Boot or Logon Initialization Script
amazon_inspector Amazon Inspector technique_scores T1037 Boot or Logon Initialization Scripts
Comments
The Amazon Inspector Best Practices assessment package can assess security control "Configure permissions for system directories" that prevents privilege escalation by local users and ensures only the root account can modify/execute system configuration information and binaries. Amazon Inspector does not directly protect against system modifications rather it just checks to see if security controls are in place which can inform decisions around hardening the system. Furthermore, Amazon Inspector only supports a subset of the sub-techniques for this technique. Due to these things and the fact the security control is only supported for Linux platforms, the score is Minimal.
References

ATT&CK Subtechniques

Technique ID Technique Name Number of Mappings
T1037.002 Logon Script (Mac) 8
T1037.001 Logon Script (Windows) 3
T1037.003 Network Logon Script 8
T1037.004 RC Scripts 9
T1037.005 Startup Items 8