MITRE ATT&CK

Boot or Logon Autostart persistence involves modifying Windows settings to execute malicious code when the system starts or a user logs in. This is often achieved through registry keys or startup folders. Attackers use this method to maintain access even after a reboot.


How Attackers Use It


Detection

Windows Event Logs:

Sysmon:


Threat Hunting

Splunk Query