T1037.005

Startup Items

Adversaries may use startup items automatically executed at boot initialization to establish persistence on macOS systems. Startup items execute during the final phase of the boot process and contain shell scripts or other executable files along with configuration information (StartupParameters.plist) used by the system to determine execution order. Although technically deprecated in favor of Launch Daemons, the /Library/StartupItems directory may still exist on systems. An adversary can create the appropriate folders and files in the StartupItems directory to register their own persistence mechanism that executes as root during system boot.

Microsoft Sentinel / Defender
kusto
// T1037.005 - macOS Startup Items Persistence Detection
// Detects file creation/modification in /Library/StartupItems or related startup item paths
// Note: macOS telemetry via Microsoft Defender for Endpoint (MDE) on macOS
DeviceFileEvents
| where Timestamp > ago(24h)
| where FolderPath has "/Library/StartupItems"
    or FileName =~ "StartupParameters.plist"
| extend StartupItemDir = extract(@"(/Library/StartupItems/[^/]+)", 1, FolderPath)
| extend IsPlist = FileName endswith ".plist"
| extend IsExecutable = not(FileName endswith ".plist") and not(FileName endswith ".txt") and not(FileName endswith ".log")
| project Timestamp, DeviceName, AccountName, ActionType, FileName, FolderPath,
          InitiatingProcessFileName, InitiatingProcessCommandLine,
          InitiatingProcessAccountName, StartupItemDir, IsPlist, IsExecutable
| sort by Timestamp desc
| union (
    DeviceProcessEvents
    | where Timestamp > ago(24h)
    | where ProcessCommandLine has "/Library/StartupItems"
        or ProcessCommandLine has "StartupParameters.plist"
        or (ProcessCommandLine has "mkdir" and ProcessCommandLine has "/Library/StartupItems")
        or (ProcessCommandLine has "cp" and ProcessCommandLine has "/Library/StartupItems")
        or (ProcessCommandLine has "chmod" and ProcessCommandLine has "/Library/StartupItems")
    | project Timestamp, DeviceName, AccountName, ActionType=ActionType, FileName,
              FolderPath=InitiatingProcessFolderPath, InitiatingProcessFileName,
              InitiatingProcessCommandLine, InitiatingProcessAccountName,
              StartupItemDir="", IsPlist=false, IsExecutable=false
    | sort by Timestamp desc
)
high severity medium confidence

Data Sources

File: File Creation File: File Modification Process: Process Creation Command: Command Execution Microsoft Defender for Endpoint (macOS)

Required Tables

DeviceFileEvents DeviceProcessEvents

False Positives

  • Legitimate third-party macOS software installers that still use the deprecated StartupItems mechanism for compatibility with older macOS versions
  • System administrators or IT teams manually creating startup items for legacy application compatibility
  • macOS system updates or migration tools that read or restore /Library/StartupItems content from backups
  • Security or monitoring software that scans /Library/StartupItems as part of system inventory or compliance checks

Unlock Pro Content

Get the full detection package for T1037.005 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections