Home  >  APT29  >  Results  >  F-Secure  >  Registry Run Keys / Startup Folder

Technique Results: Registry Run Keys / Startup Folder (T1060) Technique Page Information

The ATT&CK technique page displays all procedures used to test the technique, and their respective detections. The Procedure column contains a description of how the technique was tested . The Step column is where the procedure occurred in the operational flow. Click the Step Number to view it in the Operational Flow panel. Detections are classified by one or more Detection Types, summarized by the Detection Notes, and may be supported by screenshots.

MITRE does not assign scores, rankings, or ratings. The evaluation results are available to the public, so other organizations may provide their own analysis and interpretation - these are not endorsed or validated by MITRE.

Vendor Configuration     All Results JSON Legend
Legend
Main Detection Categories: Detection Modifiers:

None

Telemetry

Indicator of
Compromise

General
Behavior

MSSP

General

Tactic

Specific
Behavior

Technique

Enrichment

Tainted

Alert

Correlated

Delayed

Host
Interrogation

Residual
Artifact

Configuration
Change

Innovative
Procedures Criteria Step
Detection Type Detection Notes
Created a LNK file (hostui.lnk) in the Startup folder that executes on login
powershell.exe creating the file hostui.lnk in the Startup folder
5.B.1
General (Correlated, Alert)
A General alert detection (low severity) was generated for a shortcut file (hostui.lnk) being modified. The event was correlated to a parent alert for suspicious powershell. [1]
MSSP (Delayed (Manual))
An MSSP detection occurred containing evidence of the creation of the hostui.lnk file in the Startup folder. [1] [2]
Telemetry
Telemetry showed Startup folder registry modification for hostui.lnk. [1]
Executed LNK payload (hostui.lnk) in Startup Folder on user login
Evidence that the file hostui.lnk (which executes hostui.bat as a byproduct) was executed from the Startup Folder
10.B.1
None
No detection capability demonstrated for this procedure.
Established Registry Run key persistence using PowerShell
Addition of the Webcache subkey in HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
11.A.11
Technique (Alert)
A Technique alert detection (high severity) was generated for a detected process performing a Registry write that looks like a launchpoint. [1]
MSSP (Delayed (Manual))
An MSSP detection occurred containing evidence of the creation of a registry value named "Webcache." [1]
Telemetry
Telemetry showed a Registry write event of the Webcache subkey identified as an Autorun. [1]