T1543 Create or Modify System Process Mappings

Adversaries may create or modify system-level processes to repeatedly execute malicious payloads as part of persistence. When operating systems boot up, they can start processes that perform background system functions. On Windows and Linux, these system processes are referred to as services.(Citation: TechNet Services) On macOS, launchd processes known as Launch Daemon and Launch Agent are run to finish system initialization and load user specific parameters.(Citation: AppleDocs Launch Agent Daemons)

Adversaries may install new services, daemons, or agents that can be configured to execute at startup or a repeatable interval in order to establish persistence. Similarly, adversaries may modify existing services, daemons, or agents to achieve the same effect.

Services, daemons, or agents may be created with administrator privileges but executed under root/SYSTEM privileges. Adversaries may leverage this functionality to create or modify system processes in order to escalate privileges.(Citation: OSX Malware Detection)

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
AC-17 Remote Access Protects T1543 Create or Modify System Process
AC-2 Account Management Protects T1543 Create or Modify System Process
AC-3 Access Enforcement Protects T1543 Create or Modify System Process
AC-5 Separation of Duties Protects T1543 Create or Modify System Process
AC-6 Least Privilege Protects T1543 Create or Modify System Process
CA-7 Continuous Monitoring Protects T1543 Create or Modify System Process
CA-8 Penetration Testing Protects T1543 Create or Modify System Process
CM-11 User-installed Software Protects T1543 Create or Modify System Process
CM-2 Baseline Configuration Protects T1543 Create or Modify System Process
CM-3 Configuration Change Control Protects T1543 Create or Modify System Process
CM-5 Access Restrictions for Change Protects T1543 Create or Modify System Process
CM-6 Configuration Settings Protects T1543 Create or Modify System Process
CM-7 Least Functionality Protects T1543 Create or Modify System Process
IA-2 Identification and Authentication (organizational Users) Protects T1543 Create or Modify System Process
IA-4 Identifier Management Protects T1543 Create or Modify System Process
RA-5 Vulnerability Monitoring and Scanning Protects T1543 Create or Modify System Process
SA-22 Unsupported System Components Protects T1543 Create or Modify System Process
SI-16 Memory Protection Protects T1543 Create or Modify System Process
SI-3 Malicious Code Protection Protects T1543 Create or Modify System Process
SI-4 System Monitoring Protects T1543 Create or Modify System Process
SI-7 Software, Firmware, and Information Integrity Protects T1543 Create or Modify System Process
action.hacking.variety.Abuse of functionality Abuse of functionality. related-to T1543 Create or Modify System Process
action.hacking.variety.Backdoor Hacking action that creates a backdoor for use. related-to T1543 Create or Modify System Process
action.hacking.vector.Backdoor Hacking actions taken through a backdoor. C2 is only used by malware. related-to T1543 Create or Modify System Process
action.malware.variety.Backdoor Malware creates a backdoor capability for hacking. Child of 'RAT' when combined with 'Trojan'. Child of 'Backdoor or C2'. related-to T1543 Create or Modify System Process
action.malware.variety.Backdoor or C2 Malware creates a remote control capability, but it's unclear if it's a backdoor for hacking or C2 for malware. Parent of 'C2' and 'Backdoor'. related-to T1543 Create or Modify System Process
action.malware.variety.Rootkit Rootkit (maintain local privileges and stealth) related-to T1543 Create or Modify System Process
attribute.integrity.variety.Software installation Software installation or code modification related-to T1543 Create or Modify System Process

ATT&CK Subtechniques

Technique ID Technique Name Number of Mappings
T1543.003 Windows Service 11
T1543.004 Launch Daemon 10
T1543.001 Launch Agent 10
T1543.002 Systemd Service 18