Detectionhightest

Suspicious Startup Folder Persistence

Detects the creation of potentially malicious script and executable files in Windows startup folders, which is a common persistence technique used by threat actors. These files (.ps1, .vbs, .js, .bat, etc.) are automatically executed when a user logs in, making the Startup folder an attractive target for attackers. This technique is frequently observed in malvertising campaigns and malware distribution where attackers attempt to maintain long-term access to compromised systems.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Nasreddine Bencherchali (Nextron Systems), Swachchhanda Shrawan Poudel (Nextron Systems)Created Wed Aug 10Updated Sun Oct 1228208707-fe31-437f-9a7f-4b1108b94d2ewindows
Log Source
WindowsFile Event
ProductWindows← raw: windows
CategoryFile Event← raw: file_event

Events for file system activity including creation, modification, and deletion.

Detection Logic
Detection Logic1 selector
detection:
    selection:
        TargetFilename|contains: '\Windows\Start Menu\Programs\Startup\'
        TargetFilename|endswith:
            # Add or remove suspicious extensions according to your env needs
            - '.bat'
            - '.cmd'
            - '.dll'
            - '.hta'
            - '.jar'
            - '.js'
            - '.jse'
            - '.msi'
            - '.ps1'
            - '.psd1'
            - '.psm1'
            - '.scr'
            - '.url'
            - '.vba'
            - '.vbe'
            - '.vbs'
            - '.wsf'
    condition: selection
False Positives

Rare legitimate usage of some of the extensions mentioned in the rule

Rule Metadata
Rule ID
28208707-fe31-437f-9a7f-4b1108b94d2e
Status
test
Level
high
Type
Detection
Created
Wed Aug 10
Modified
Sun Oct 12
Path
rules/windows/file/file_event/file_event_win_susp_startup_folder_persistence.yml
Raw Tags
attack.privilege-escalationattack.executionattack.t1204.002attack.persistenceattack.t1547.001
View on GitHub