Skip to main content
T1547Persistencemedium difficulty

Boot or Logon Autostart Execution

Boot or Logon Autostart Execution (T1547) is a MITRE ATT&CK technique in the Persistence tactic. SOC analysts detect it by monitoring for XDR, SIEM events, behavioral anomalies, and the specific indicators described in this detection guide. Practice detection in SOCSimulator Operations.

XDRSIEM

What is Boot or Logon Autostart Execution?

Adversaries may configure system settings to automatically execute a program during system boot or logon to maintain persistence or gain higher-level privileges on compromised systems. Operating systems may have mechanisms for automatically running a program on system boot or account logon. These mechanisms may include automatically executing programs that are placed in specially designated directories or are referenced by repositories that store configuration information, such as the Windows Registry. An adversary may achieve the same goal by modifying or extending features of the kernel. Common autostart locations on Windows include the Run and RunOnce registry keys, Startup folder locations, services configured to start automatically, and the Winlogon registry key. On Linux and macOS, init scripts, systemd units, and launch agents provide similar functionality. Understanding these autostart mechanisms is essential for security analysts who need to identify malicious persistence during incident response investigations.

Boot or Logon Autostart Execution is documented as technique T1547 in the MITRE ATT&CK knowledge base under the Persistence tactic. Detection requires visibility into XDR, SIEM telemetry.

Detection Strategies

The following detection strategies help SOC analysts identify Boot or Logon Autostart Execution activity. These methods apply across XDR, SIEM environments and can be implemented as detection rules, correlation queries, or behavioral analytics in your security platform.

  1. 1

    Monitor Windows Registry modifications to HKLM and HKCU Run and RunOnce keys, alerting on new entries pointing to executables in user-writable locations or using obfuscated command line arguments.

  2. 2

    Track file creation events in Windows Startup folder locations for all users, including AllUsers and per-user startup folders, which are commonly used for persistence by malware that does not require administrative privileges.

  3. 3

    Monitor service creation and modification events, focusing on services created outside of standard software installation processes or services pointing to executables in non-standard locations.

  4. 4

    Implement file integrity monitoring on autostart script locations on Linux systems including /etc/init.d/, systemd unit directories, and user-specific .bashrc and .profile files that execute on login.

  5. 5

    Correlate autostart location modifications with the process that made the change and the user context, as legitimate applications typically modify these locations only during installation with elevated privileges.

Example Alerts

These realistic alert examples show what Boot or Logon Autostart Execution looks like in your security tools. Use them to tune detection rules and train analysts to recognize true positives versus false positives in live environments.

HighXDR

Malicious Registry Run Key Added

Registry modification detected adding a new value to HKCU\Software\Microsoft\Windows\CurrentVersion\Run. The entry points to a file in %AppData%\Roaming\Microsoft\Windows named svchost32.exe, which is not a legitimate Windows system file. The file was created 3 minutes prior by a PowerShell process with encoded command line arguments.

MediumXDR

Suspicious File Added to Startup Folder

File creation detected in C:\Users\Public\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup. The file is a JavaScript file disguised with a PDF icon. Upon execution it connects to a remote server and downloads additional payloads. The file was created by an Office process following macro execution in a received document.

CriticalSIEM

New Malicious Service Registered

New Windows service registered with display name "Windows Security Health Monitor" using sc.exe. The service executable resides in C:\ProgramData\Microsoft\Temp and is not digitally signed. The service is configured for automatic startup and runs as SYSTEM. Hash of the executable matches a known remote access trojan in threat intelligence databases.

Practice Detecting Boot or Logon Autostart Execution

SOCSimulator provides hands-on training rooms where you investigate real-world attack scenarios including Boot or Logon Autostart Execution. Build detection skills with zero consequences — free forever.

12,000+ analysts trained
No credit card required

Frequently Asked Questions

How do SOC analysts detect Boot or Logon Autostart Execution?
SOC analysts detect Boot or Logon Autostart Execution (T1547) by monitoring XDR, SIEM telemetry for behavioral anomalies and specific indicators. Key detection methods include monitor windows registry modifications to hklm and hkcu run and runonce keys, alerting on new entries pointing to executables in user-writable locatio. SOCSimulator provides hands-on practice detecting this technique with realistic alerts.
What security tools are used to detect Boot or Logon Autostart Execution?
Boot or Logon Autostart Execution can be detected using XDR, SIEM platforms. XDR tools are particularly effective for this technique because they provide visibility into the persistence phase of the attack chain. SOCSimulator simulates all three tool types for hands-on training.
How common is Boot or Logon Autostart Execution in real-world attacks?
Boot or Logon Autostart Execution is a well-documented MITRE ATT&CK technique in the Persistence tactic. It appears in threat intelligence reports from multiple security vendors and has been observed in campaigns by various threat actor groups. SOCSimulator includes realistic Boot or Logon Autostart Execution scenarios based on documented attack patterns, helping analysts build detection intuition.
Can I practice detecting Boot or Logon Autostart Execution for free?
Yes. SOCSimulator offers free forever access to training scenarios, including Persistence techniques like Boot or Logon Autostart Execution. You can investigate realistic alerts in guided Operations rooms, build detection skills with SIEM, XDR, and Firewall interfaces, and test yourself under pressure in Shift Mode. No credit card required.
Glossary

What is Persistence? — SOC Glossary

Persistence refers to techniques adversaries use to maintain access across reboots, credential changes, and other disrup…

Read more
Glossary

What is EDR? — SOC Glossary

Endpoint Detection and Response (EDR) is a security technology that continuously monitors endpoint activity, recording p…

Read more
Glossary

What is Threat Hunting? — SOC Glossary

Threat hunting is the proactive, human-led process of searching through security telemetry to find hidden threats that e…

Read more
Glossary

What is IOC? — SOC Glossary

An Indicator of Compromise (IOC) is an observable artifact, such as a file hash, IP address, domain name, URL, registry …

Read more
Career Path

Threat Hunter Career Guide — Salary & Skills

Threat Hunters do not wait for alerts. You develop hypotheses based on threat intelligence and adversary behavior models…

Read more
Career Path

Detection Engineer Career Guide — Salary & Skills

Detection Engineers build the rules, analytics, and automated workflows that determine what the SOC can see. You transla…

Read more
Tool

XDR Training Console — SOCSimulator

The XDR console in SOCSimulator replicates the investigation workflow of platforms like CrowdStrike Falcon, Microsoft De…

Read more
Tool

SIEM Training Console — SOCSimulator

The SIEM console in SOCSimulator replicates the workflow of enterprise platforms like Splunk Enterprise Security, Micros…

Read more
Comparison

SOCSimulator Vs. Letsdefend — Platform Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator Vs. Tryhackme — Platform Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more
Playbook

Macro-Enabled Document Malware Investigation — Investigation Playbook

When XDR detects a Microsoft Office process spawning scripting interpreters, Word launching PowerShell, Excel spawning c…

Read more
Glossary

SOC Glossary — Security Operations Terminology

Complete glossary of Security Operations Center terminology for aspiring SOC analysts.

Read more

We use cookies to improve your experience and measure usage. Learn more