Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This hunting query detects when a file is created in the Startup folder. This is a common technique used by adversaries to maintain persistence on a system.
| Attribute | Value |
|---|---|
| Type | Hunting Query |
| Solution | Malware Protection Essentials |
| ID | 64e199a8-b26c-462f-a65c-09ed9b53a47b |
| Tactics | Persistence, PrivilegeEscalation, DefenseEvasion |
| Techniques | T1547, T1112 |
| Required Connectors | CrowdStrikeFalconEndpointProtection, MicrosoftThreatProtection, SentinelOne, VMwareCarbonBlack, CiscoSecureEndpoint, TrendMicroApexOne, TrendMicroApexOneAma |
| Source | View on GitHub |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Hunting Queries · Back to Malware Protection Essentials