Malware Persistence
Techniques that adversaries use to keep access to systems across restarts.
Contents
Techniques
Generic
A free, community-sourced, machine-readable knowledge base of digital forensic artifacts.
Repository of detection rules, covering persistence techniques as well. You can even use filters such as --filter tag:attack.persistence or specifically for one technique tag:attack.t1084.
Detection Testing
Linux
Collection
macOS
A tool to uncover persistently installed software in order to generically reveal such malware. See GitHub repository too for the source code.
A simple utility that will scan your computer for applications that are either susceptible to dylib hijacking or have been hijacked. See GitHub repository too for the source code.
Windows
A PowerShell version of Autoruns.
Instead of using CSV output and copy these file to the server, you can use the AutorunsToWinEventLog script to convert the Autoruns output to Windows event logs and rely on standard Windows event log forwarding.
Powershell module to hunt for persistence implanted in Windows machines.
Extracts various persistence mechanisms from the registry files directly.
Extract various persistence mechanisms, e.g. by using the config file UserClassesASEPs to extract user's CLSID information.
The tool allows collecting various predefined artifactgs using targets and modules, see KapeFiles which include persistence mechanisms, among others there's a collection of LNK files, scheduled task files and scheduled task listing or a WMI repository auditing module.
Generic
Use the tools from this list which includes awesome free (mostly open source) forensic analysis tools and resources. They help collecting the persistence mechanisms at scale, e.g. by using remote forensics tools.
Use rules and logs from the HIDS to detection configuration changes.