Detection rules › Sigma

Suspicious Startup Folder Persistence

Severity
high
Author
Nasreddine Bencherchali (Nextron Systems), Swachchhanda Shrawan Poudel (Nextron Systems)
Source
upstream

Detects the creation of potentially malicious script and executable files in Windows startup folders, which is a common persistence technique used by threat actors. These files (.ps1, .vbs, .js, .bat, etc.) are automatically executed when a user logs in, making the Startup folder an attractive target for attackers. This technique is frequently observed in malvertising campaigns and malware distribution where attackers attempt to maintain long-term access to compromised systems.

MITRE ATT&CK coverage

TacticTechniques
ExecutionT1204.002 User Execution: Malicious File
PersistenceT1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Privilege EscalationT1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

Event coverage

ProviderEvent IDTitle
Sysmon11FileCreate

Stages and Predicates

Stage 1: selection

or:
TargetFilename|endswith: .bat
TargetFilename|endswith: .cmd
TargetFilename|endswith: .dll
TargetFilename|endswith: .hta
TargetFilename|endswith: .jar
TargetFilename|endswith: .js
TargetFilename|endswith: .jse
TargetFilename|endswith: .msi
TargetFilename|endswith: .ps1
TargetFilename|endswith: .psd1
TargetFilename|endswith: .psm1
TargetFilename|endswith: .scr
TargetFilename|endswith: .url
TargetFilename|endswith: .vba
TargetFilename|endswith: .vbe
TargetFilename|endswith: .vbs
TargetFilename|endswith: .wsf
TargetFilename|contains: '\Windows\Start Menu\Programs\Startup\'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
TargetFilenameends_with
  • .bat corpus 15 (sigma 15)
  • .cmd corpus 8 (sigma 8)
  • .dll corpus 21 (sigma 21)
  • .hta corpus 12 (sigma 12)
  • .jar corpus 2 (sigma 2)
  • .js corpus 8 (sigma 8)
  • .jse corpus 2 (sigma 2)
  • .msi corpus 2 (sigma 2)
  • .ps1 corpus 15 (sigma 15)
  • .psd1
  • .psm1 corpus 4 (sigma 4)
  • .scr corpus 8 (sigma 8)
  • .url
  • .vba corpus 3 (sigma 3)
  • .vbe corpus 13 (sigma 13)
  • .vbs corpus 16 (sigma 16)
  • .wsf corpus 6 (sigma 6)
TargetFilenamematch
  • \Windows\Start Menu\Programs\Startup\