T1574.005 Executable Installer File Permissions Weakness

Adversaries may execute their own malicious payloads by hijacking the binaries used by an installer. These processes may automatically execute specific binaries as part of their functionality or to perform other actions. If the permissions on the file system directory containing a target binary, or permissions on the binary itself, are improperly set, then the target binary may be overwritten with another binary using user-level permissions and executed by the original process. If the original process and thread are running under a higher permissions level, then the replaced binary will also execute under higher-level permissions, which could include SYSTEM.

Another variation of this technique can be performed by taking advantage of a weakness that is common in executable, self-extracting installers. During the installation process, it is common for installers to use a subdirectory within the <code>%TEMP%</code> directory to unpack binaries such as DLLs, EXEs, or other payloads. When installers create subdirectories and files they often do not set appropriate permissions to restrict write access, which allows for execution of untrusted code placed in the subdirectories or overwriting of binaries used in the installation process. This behavior is related to and may take advantage of DLL Search Order Hijacking.

Adversaries may use this technique to replace legitimate binaries with malicious ones as a means of executing code at a higher permissions level. Some installers may also require elevated privileges that will result in privilege escalation when executing adversary controlled code. This behavior is related to Bypass User Account Control. Several examples of this weakness in existing common installers have been reported to software vendors.(Citation: mozilla_sec_adv_2012) (Citation: Executable Installers are Vulnerable) If the executing process is set to run at a specific time or during a certain event (e.g., system bootup) then this technique can also be used for persistence.

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.AA-01.01 Identity and credential management Mitigates T1574.005 Executable Installer File Permissions Weakness
Comments
This diagnostic statement protects against Executable Installer File Permissions Weakness through the use of hardened access control policies, secure defaults, password complexity requirements, multifactor authentication requirements, and removal of terminated accounts.
References

    NIST 800-53 Mappings

    Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
    CM-06 Configuration Settings mitigates T1574.005 Executable Installer File Permissions Weakness
    CM-05 Access Restrictions for Change mitigates T1574.005 Executable Installer File Permissions Weakness
    RA-05 Vulnerability Monitoring and Scanning mitigates T1574.005 Executable Installer File Permissions Weakness
    CM-02 Baseline Configuration mitigates T1574.005 Executable Installer File Permissions Weakness
    CM-02 Baseline Configuration mitigates T1574.005 Executable Installer File Permissions Weakness
    IA-02 Identification and Authentication (Organizational Users) mitigates T1574.005 Executable Installer File Permissions Weakness
    SI-04 System Monitoring mitigates T1574.005 Executable Installer File Permissions Weakness
    AC-02 Account Management mitigates T1574.005 Executable Installer File Permissions Weakness
    AC-03 Access Enforcement mitigates T1574.005 Executable Installer File Permissions Weakness
    AC-04 Information Flow Enforcement mitigates T1574.005 Executable Installer File Permissions Weakness
    AC-05 Separation of Duties mitigates T1574.005 Executable Installer File Permissions Weakness
    AC-06 Least Privilege mitigates T1574.005 Executable Installer File Permissions Weakness

    VERIS Mappings

    Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
    action.hacking.variety.Exploit misconfig Exploit a misconfiguration (vs vuln or weakness) related-to T1574.005 Executable Installer File Permissions Weakness
    action.hacking.variety.Hijack To assume control over and steal functionality for an illicit purpose (e.g. Hijacking phone number intercept SMS verification codes) related-to T1574.005 Executable Installer File Permissions Weakness
    action.hacking.variety.Unknown Unknown related-to T1574.005 Executable Installer File Permissions Weakness