DET0125 Detect persistence via reopened application plist modification (macOS)
| Item |
Value |
| ID |
DET0125 |
| Version |
1.0 |
| Created |
21 October 2025 |
| Last Modified |
21 October 2025 |
Technique Detected: T1547.007 (Re-opened Applications)
Analytics
macOS
AN0349
Unusual modification or creation of loginwindow-related plist files in ‘~/Library/Preferences/ByHost’ correlated with unauthorized application paths and execution upon login.
Log Sources
Mutable Elements
| Field |
Description |
| UserContext |
Restrict to targeted users or unexpected users writing to plist |
| FilePathPattern |
Allow tuning for alternative persistence paths or directory redirection |
| TimeWindow |
Correlate plist write and process execution within logon window |
| BinaryAnomalyScore |
Optional scoring of launched binary based on code signing, entropy, and known safe apps |