Home >
Enterprise >
Participants >
Malwarebytes >
Boot or Logon Autostart Execution (T1547)
|
|
See technique results for:
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
7.C.4
|
|
|||||
10.A.4
|
|
APT29 |
||||
Step | ATT&CK Pattern |
|
||
5.B.1
|
|
|||
10.B.1
|
|
|||
11.A.11
|
|
Procedure
Created a LNK file (hostui.lnk) in the Startup folder that executes on login
Criteria
powershell.exe creating the file hostui.lnk in the Startup folder
Footnotes
- Updates to detections and logging were enabled after the start of the evaluation, so it is identified as a Detection Configuration Change.


[2]


Procedure
Established Registry Run key persistence using PowerShell
Criteria
Addition of the Webcache subkey in HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Footnotes
- Updates to detections and logging were enabled after the start of the evaluation, so it is identified as a Detection Configuration Change.

