Skip to content

Latest commit

 

History

History
37 lines (22 loc) · 1.58 KB

File metadata and controls

37 lines (22 loc) · 1.58 KB
description

Windows Service

ATT&CK ID: T1543.003

Permissions Required: Administrator | SYSTEM

Description

Adversaries may create or modify Windows services to repeatedly execute malicious payloads as part of persistence. When Windows boots up, it starts programs or applications called services that perform background system functions. Windows service configuration information, including the file path to the service's executable or recovery programs/commands, is stored in the Windows Registry.

Adversaries may install a new service or modify an existing service to execute at startup in order to persist on a system. Service configurations can be set or modified using system utilities (such as sc.exe), by directly modifying the Registry, or by interacting directly with the Windows API.

Services may be created with administrator privileges but are executed under SYSTEM privileges, so an adversary may also use a service to escalate privileges. Adversaries may also directly start services through Service Execution. To make detection analysis more challenging, malicious services may also incorporate Masquerade Task or Service (ex: using a service and/or payload name related to a legitimate OS or benign software component).

[Source]

Techniques

Empire

// Some code

Metasploit

// Some code

Mitigation

Further Reading