Hunting Persistence
Last updated
Last updated
Used by attackers to maintain access to a machine once it is compromised
Things to look for
file creation
Registry modifications
Filter by the Rule Names in order to get past network noise
Detections for a file being placed in the \Startup\
or \Start Menu
directories
For more information about this technique check out
For more information about this technique checkout out