T1059 Boot or Logon Autostart Execution is a technique in the MITRE ATT&CK framework under the Persistence tactic. It refers to adversaries using system mechanisms to automatically execute programs or scripts at system boot or user logon. This technique allows attackers to maintain persistence by ensuring that malicious programs or scripts are triggered whenever the system is started or a user logs into the system.
Adversaries commonly abuse registry keys, startup folders, or other system configurations to achieve autostart execution. This method can be used to execute malicious code, deploy additional payloads, or ensure that attackers retain access after system restarts or user logins.
Boot Logon and Auto Start Execution are integral components of modern computing systems, functioning to streamline and manage the initiation of processes and applications during the startup phase of a computer and upon user login.
Boot Logon encompasses the series of actions and procedures triggered when a computer is powered on and begins loading the operating system. This phase is crucial for setting up the computer's environment, involving the loading of
The primary objective of Boot Logon is to ensure that the foundational elements of the system are correctly loaded and configured, providing a stable and operational platform for the user and any subsequent processes.
Auto Start Execution, on the other hand, refers to the automatic launching of certain programs, scripts, or services either when a user logs into the system or under specific pre-set conditions. This feature enhances user convenience and system efficiency by ensuring that frequently used applications or essential system services, such as security software and system monitoring tools, are readily available without manual intervention. Auto Start Execution can be configured through various mechanisms within the operating system, including but not limited to specific registry keys in Windows environments, startup folders, or the creation of scheduled tasks.
Together, Boot Logon and Auto Start Execution form a critical part of the user experience and system functionality, enabling a seamless transition from system startup to operational readiness by automating the initiation of key processes and applications. While these features are designed with efficiency and user convenience in mind, they also demand careful management and oversight to prevent misuse, particularly in the context of unauthorized or malicious software seeking to exploit these mechanisms for persistence or unauthorized activities.
Adversaries can exploit Boot or Logon Autostart Execution mechanisms to achieve persistence, privilege escalation, and stealth in a compromised system. By leveraging these features, malicious actors can ensure their malware or tools are automatically executed whenever the system boots up or a user logs in. This can be particularly challenging to detect and remove, as the processes can embed themselves deeply within the system's normal operations.
Here are some common ways adversaries might use these mechanisms:
To defend against misuse of autostart features, it advised to restrict write access to these areas, use security software for detection, regularly audit autostart settings, and educate users about software risks.
Adversaries increasingly abuse system startup and logon settings to ensure malicious programs execute automatically, allowing them to maintain persistence or escalate privileges on compromised systems. This is commonly achieved by exploiting operating system mechanisms such as startup directories or configuration repositories like the Windows Registry.
Ranked 9th in the Red Report 2025, this technique climbed to 7th in the Red Report 2026. Its third consecutive appearance in the top ten underscores its ongoing prevalence and reliability for attackers.
The Boot or Logon Autostart Execution technique consists of 14 sub-techniques in MITRE ATT&CK v18.
This blog serves as a hub page for the T1547 Boot or Logon Autostart Execution technique within the MITRE ATT&CK framework. Each linked sub-technique page explains how the technique works, details adversary behavior, and includes real-world procedure examples observed in the wild, as documented in the Red Report.