T1547.007 - Re-opened Applications
Sub-technique
Tactics:
Persistence Privilege Escalation
Persistence Privilege Escalation
Platforms:
macOS
macOS
Detection:
Not specified
Not specified
Description:
Adversaries may modify plist files to automatically run an application when a user logs in. When a user logs out or restarts via the macOS Graphical User Interface (GUI), a prompt is provided to the user with a checkbox to "Reopen windows when logging back in".(Citation: Re-Open windows on Mac) When selected, all applications currently open are added to a property list file named <code>com.apple.loginwindow.[UUID].plist</code> within the <code>~/Library/Preferences/ByHost</code> directory.(Citation: Methods of Mac Malware Persistence)(Citation: Wardle Persistence Chapter) Applications listed in this file are automatically reopened upon the user’s next logon.
Adversaries can establish [Persistence](https://attack.mitre.org/tactics/TA0003) by adding a malicious application path to the <code>com.apple.loginwindow.[UUID].plist</code> file to execute payloads when a user logs in.
Adversaries can establish [Persistence](https://attack.mitre.org/tactics/TA0003) by adding a malicious application path to the <code>com.apple.loginwindow.[UUID].plist</code> file to execute payloads when a user logs in.
Metadata
| MITRE ID: | T1547.007 |
| STIX ID: | attack-pattern--e5cc9e7a-e61a-... |
| Platforms: | macOS |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |