T1037.001 - Logon Script (Windows)

Sub-technique
Tactics:
Persistence Privilege Escalation
Platforms:
Windows
Detection:
Not specified
Description:
Adversaries may use Windows logon scripts automatically executed at logon initialization to establish persistence. Windows allows logon scripts to be run whenever a specific user or group of users log into a system.(Citation: TechNet Logon Scripts) This is done via adding a path to a script to the <code>HKCU\Environment\UserInitMprLogonScript</code> Registry key.(Citation: Hexacorn Logon Scripts)

Adversaries may use these scripts to maintain persistence on a single system. Depending on the access configuration of the logon scripts, either local credentials or an administrator account may be necessary.
Metadata
MITRE ID: T1037.001
STIX ID: attack-pattern--eb125d40-0b2d-...
Platforms: Windows
Created: 13/01/2026 17:48
Updated: 06/03/2026 16:00