Hunting Persistence
Persistence
Used by attackers to maintain access to a machine once it is compromised
Things to look for
file creation
Registry modifications
Filter by the Rule Names in order to get past network noise
Hunting Startup Persistence
Detections for a file being placed in the
\Startup\
or\Start Menu
directories
For more information about this technique check out MITRE ATT&CK T1547
Hunting Registry Key Persistence
For more information about this technique checkout out MITRE ATT&CK T1112
Last updated