Registry Run Keys / Startup Folder (T1547.001)

View on ATT&CK

In Playbook

Associated Tactics

  • Persistence
  • Privilege Escalation

Persistence (TA0003)

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

View on ATT&CK

Procedure Examples

Description Source(s)
Arntz, P. (2016, March 30). Hiding in Plain Sight. Retrieved August 3, 2020. Malwarebytes Wow6432Node 2016
Microsoft. (2018, May 31). 32-bit and 64-bit Application Data in the Registry. Retrieved August 3, 2020. Microsoft Wow6432Node 2018
Microsoft. (n.d.). Run and RunOnce Registry Keys. Retrieved September 12, 2024. Microsoft Run Key
Moe, O. (2018, March 21). Persistence using RunOnceEx - Hidden from Autoruns.exe. Retrieved June 29, 2018. Oddvar Moe RunOnceEx Mar 2018
Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016. TechNet Autoruns