Adversaries may abuse system services or daemons to execute commands or programs. Adversaries can execute malicious content by interacting with or creating services either locally or remotely. Many services are set to run at boot, which can aid in achieving persistence (Create or Modify System Process), but adversaries can also abuse services for one-time or temporary execution.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
PR.IR-01.05 | Remote access protection | Mitigates | T1569 | System Services |
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
References
|
PR.AA-05.02 | Privileged system access | Mitigates | T1569 | System Services |
Comments
This diagnostic statement protects against System Services through the use of privileged account management and the use of multi-factor authentication.
References
|
DE.CM-06.02 | Third-party access monitoring | Mitigates | T1569 | System Services |
Comments
This diagnostic statement protects against System Services through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
References
|
PR.AA-01.01 | Identity and credential management | Mitigates | T1569 | System Services |
Comments
This diagnostic statement protects against System Services through the use of hardened access control policies, secure defaults, password complexity requirements, multifactor authentication requirements, and removal of terminated accounts.
References
|
Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
CA-07 | Continuous Monitoring | mitigates | T1569 | System Services | |
CM-06 | Configuration Settings | mitigates | T1569 | System Services | |
CM-05 | Access Restrictions for Change | mitigates | T1569 | System Services | |
CM-11 | User-installed Software | mitigates | T1569 | System Services | |
SI-03 | Malicious Code Protection | mitigates | T1569 | System Services | |
SI-07 | Software, Firmware, and Information Integrity | mitigates | T1569 | System Services | |
CM-02 | Baseline Configuration | mitigates | T1569 | System Services | |
IA-02 | Identification and Authentication (Organizational Users) | mitigates | T1569 | System Services | |
CM-07 | Least Functionality | mitigates | T1569 | System Services | |
SI-04 | System Monitoring | mitigates | T1569 | System Services | |
AC-02 | Account Management | mitigates | T1569 | System Services | |
AC-03 | Access Enforcement | mitigates | T1569 | System Services | |
AC-05 | Separation of Duties | mitigates | T1569 | System Services | |
AC-06 | Least Privilege | mitigates | T1569 | System Services |
Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
action.hacking.variety.OS commanding | OS commanding. Child of 'Exploit vuln'. | related-to | T1569 | System Services | |
action.hacking.vector.Command shell | Remote shell | related-to | T1569 | System Services | |
action.hacking.variety.Abuse of functionality | Abuse of functionality. | related-to | T1569 | System Services |
Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
google_secops | Google Security Operations | technique_scores | T1569 | System Services |
Comments
Google Security Ops is able to trigger alerts based off command-line arguments and suspicious system process that could indicate abuse of system services.
This technique was scored as minimal based on low or uncertain detection coverage factor.
https://github.com/chronicle/detection-rules/blob/783e0e5947774785db1c55041b70176deeca6f46/soc_prime_rules/threat_hunting/process_creation/suspicious_calculator_usage.yaral
https://github.com/chronicle/detection-rules/blob/783e0e5947774785db1c55041b70176deeca6f46/soc_prime_rules/threat_hunting/windows/abusing_attrib_exe_to_change_file_attributes.yaral
References
|
Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1569.001 | Launchctl | 9 |
T1569.002 | Service Execution | 19 |