security analyst security skill risk: medium
Windows Startup Folder Persistence Hunter
The prompt outlines steps to detect T1547.001 startup folder persistence by enumerating files in Windows startup directories, analyzing metadata and signatures, flagging suspicious…
SKILL 4 files · 2 folders
SKILL.md
--- name: hunting-for-startup-folder-persistence description: "Detect T1547.001 startup folder persistence by monitoring Windows startup directories for suspicious file creation," --- # Hunting for Startup Folder Persistence ## Overview Attackers use Windows startup folders for persistence (MITRE ATT&CK T1547.001 — Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder). Files placed in `%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup` or `C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup` execute automatically at user logon. This skill scans startup directories for suspicious files, monitors for real-time changes using Python watchdog, and analyzes file metadata to detect persistence implants. ## When to Use - When investigating security incidents that require hunting for startup folder persistence - When building detection rules or threat hunting queries for this domain - When SOC analysts need structured procedures for this analysis type - When validating security monitoring coverage for related attack techniques ## Prerequisites - Python 3.9+ with `watchdog`, `pefile` (optional for PE analysis) - Access to Windows startup folders (user and all-users) - Windows Event Logs for Event ID 4663 correlation (optional) ## Steps 1. Enumerate all files in user and system startup directories 2. Analyze file types, creation timestamps, and digital signatures 3. Flag suspicious file extensions (.bat, .vbs, .ps1, .lnk, .exe) 4. Check for recently created files (< 7 days) as potential implants 5. Monitor startup folders in real-time using watchdog FileSystemEventHandler 6. Correlate with known legitimate startup entries 7. Generate threat hunting report with T1547.001 MITRE mapping ## Expected Output - JSON report listing all startup folder contents with risk scores, file metadata, and suspicious indicators - Real-time monitoring alerts for new file creation in startup directories
REQUIRED CONTEXT
- access to Windows startup folders
- Python 3.9+ with watchdog
OPTIONAL CONTEXT
- Windows Event Logs for Event ID 4663
- pefile library for PE analysis
EXPECTED OUTPUT
- Format
- json
- Schema
- json · risk scores, file metadata, suspicious indicators, MITRE mapping
- Constraints
- include risk scores and file metadata
- map to T1547.001 MITRE technique
SUCCESS CRITERIA
- Enumerate files in startup directories
- Analyze file types and timestamps
- Flag suspicious extensions
- Monitor with watchdog
- Generate JSON report with T1547.001 mapping
CAVEATS
- Dependencies
- Python 3.9+ with watchdog and pefile
- Access to Windows startup folders
- Windows Event Logs for Event ID 4663
- Missing context
- Exact criteria or thresholds for flagging files
- Sample input data or environment details
- Ambiguities
- 'suspicious file creation' and 'suspicious indicators' are not defined precisely
- Does not specify desired output length or exact JSON schema
QUALITY
- OVERALL
- 0.55
- CLARITY
- 0.80
- SPECIFICITY
- 0.55
- REUSABILITY
- 0.25
- COMPLETENESS
- 0.60
IMPROVEMENT SUGGESTIONS
- Add a precise definition or checklist for what constitutes a suspicious file
- Include an example JSON report structure with required fields
USAGE
Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.
MORE FOR SECURITY ANALYST
- Ransomware Network Indicators Analyzersecurity analystsecurity
- APT TTP Mapping with MITRE Navigatorsecurity analystsecurity
- Linux Persistence Mechanisms Analyzersecurity analystsecurity
- Azure AD Lateral Movement KQL Detectorsecurity analystsecurity
- Kerberos Golden Ticket Forgery Detectorsecurity analystsecurity
- LOLBAS Abuse Detection with Sigma Rulessecurity analystsecurity
- Shadow IT Cloud Usage Detectorsecurity analystsecurity
- Registry Run Key Persistence Detection Guidesecurity analystsecurity
- Detect Risky OAuth Consent Grants in Entra IDsecurity analystsecurity
- Windows Service Installation Threat Huntersecurity analystsecurity
- Web Server Log Intrusion Analyzersecurity analystsecurity
- RDP Brute Force Event Log Analyzersecurity analystsecurity
- Rekall Memory Forensics Artifact Extractorsecurity analystsecurity
- Azure Activity Logs Threat Analyzersecurity analystsecurity
- Scapy Network Packet Analysis Guidesecurity analystsecurity
- TLS Certificate Transparency Log Analyzersecurity analystsecurity
- Cobalt Strike Malleable C2 Profile Analyzersecurity analystsecurity
- Email Account Compromise Detection Proceduressecurity analystsecurity
- Credential Stuffing Auth Log Analyzersecurity analystsecurity
- MISP Threat Intelligence Sharing with PyMISPsecurity analystsecurity
- MISP Threat Landscape Analysis Guidesecurity analystsecurity
- Malicious Scheduled Task Sysmon Detectorsecurity analystsecurity
- Kerberos Pass-the-Ticket Attack Detectorsecurity analystsecurity
- NTLM Relay Attack Event Log Analyzersecurity analystsecurity
- Linux Memory Forensics with LiME and Volatilitysecurity analystsecurity