Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 914

Registry Run Key Persistence

What is Registry Run Key Persistence?

Registry Run Key PersistenceClassic Windows persistence technique that adds an entry under a Run or RunOnce registry key so a binary or script executes every time a user logs on.


Registry Run-key persistence (MITRE ATT&CK T1547.001) uses well-known autorun locations such as HKCU\Software\Microsoft\Windows\CurrentVersion\Run, the matching HKLM hive, RunOnce, and the Startup folder shortcut keys. When the targeted user logs on, userinit/explorer reads these values and launches each command. The technique is simple, requires no admin rights for HKCU, and is still effective on monitored hosts because the keys also host countless legitimate updaters. Variants include using long binary names, RunOnceEx, and obscure keys like StartupApproved. Detection focuses on Sysmon event 13 (registry value set), baselining expected autoruns with tools like Autoruns, and alerting on values referencing user-writable paths.

Examples

  1. 01

    An attacker writes "Updater" = "%AppData%\loader.exe" under HKCU\Software\Microsoft\Windows\CurrentVersion\Run.

  2. 02

    Using RunOnce to execute a one-time installer that drops a service for long-term persistence.

Frequently asked questions

What is Registry Run Key Persistence?

Classic Windows persistence technique that adds an entry under a Run or RunOnce registry key so a binary or script executes every time a user logs on. It belongs to the Attacks & Threats category of cybersecurity.

What does Registry Run Key Persistence mean?

Classic Windows persistence technique that adds an entry under a Run or RunOnce registry key so a binary or script executes every time a user logs on.

How does Registry Run Key Persistence work?

Registry Run-key persistence (MITRE ATT&CK T1547.001) uses well-known autorun locations such as HKCU\Software\Microsoft\Windows\CurrentVersion\Run, the matching HKLM hive, RunOnce, and the Startup folder shortcut keys. When the targeted user logs on, userinit/explorer reads these values and launches each command. The technique is simple, requires no admin rights for HKCU, and is still effective on monitored hosts because the keys also host countless legitimate updaters. Variants include using long binary names, RunOnceEx, and obscure keys like StartupApproved. Detection focuses on Sysmon event 13 (registry value set), baselining expected autoruns with tools like Autoruns, and alerting on values referencing user-writable paths.

How do you defend against Registry Run Key Persistence?

Defences for Registry Run Key Persistence typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Registry Run Key Persistence?

Common alternative names include: Run key persistence, Autorun key persistence.

Related terms

See also