T1037.001

Logon Script (Windows)

Adversaries may use Windows logon scripts automatically executed at logon initialization to establish persistence. Windows allows logon scripts to be run whenever a specific user or group of users log into a system. This is done via adding a path to a script to the HKCU\Environment\UserInitMprLogonScript Registry key. Adversaries such as APT28, Cobalt Group, and malware families including Attor, JHUHUGIT, KGH_SPY, and Zebrocy have all leveraged this technique to maintain persistence on compromised systems.

Microsoft Sentinel / Defender
kusto
// Detect registry modifications to UserInitMprLogonScript for logon script persistence
let LogonScriptKey = "HKEY_CURRENT_USER\\Environment";
let LogonScriptValue = "UserInitMprLogonScript";
// Primary detection: Registry key modification
DeviceRegistryEvents
| where Timestamp > ago(24h)
| where RegistryKey has "Environment"
| where RegistryValueName =~ "UserInitMprLogonScript"
| where ActionType in ("RegistryValueSet", "RegistryKeyCreated")
| extend ScriptPath = RegistryValueData
| extend IsSuspiciousExtension = RegistryValueData has_any (".bat", ".cmd", ".ps1", ".vbs", ".js", ".exe", ".hta", ".wsf", ".scr")
| extend IsInUserWritablePath = RegistryValueData has_any ("%APPDATA%", "%TEMP%", "%TMP%", "AppData", "Temp", "Users\\", "ProgramData")
| extend IsInSystemPath = RegistryValueData has_any ("C:\\Windows\\", "C:\\Program Files\\", "C:\\Program Files (x86)\\")
| project
    Timestamp,
    DeviceName,
    AccountName,
    ActionType,
    RegistryKey,
    RegistryValueName,
    ScriptPath,
    IsSuspiciousExtension,
    IsInUserWritablePath,
    IsInSystemPath,
    InitiatingProcessFileName,
    InitiatingProcessCommandLine,
    InitiatingProcessParentFileName
| sort by Timestamp desc
high severity high confidence

Data Sources

Registry: Registry Key Modification Microsoft Defender for Endpoint

Required Tables

DeviceRegistryEvents

False Positives

  • Enterprise software that legitimately uses UserInitMprLogonScript for logon-time configuration (e.g., some VPN clients or network drive mapping tools)
  • Group Policy or IT administration scripts that configure logon scripts via the registry for specific users
  • Security assessment or penetration testing tools running authorized tests on the environment

Unlock Pro Content

Get the full detection package for T1037.001 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections