T1574.009 Path Interception by Unquoted Path Mappings

Adversaries may execute their own malicious payloads by hijacking vulnerable file path references. Adversaries can take advantage of paths that lack surrounding quotations by placing an executable in a higher level directory within the path, so that Windows will choose the adversary's executable to launch.

Service paths (Citation: Microsoft CurrentControlSet Services) and shortcut paths may also be vulnerable to path interception if the path has one or more spaces and is not surrounded by quotation marks (e.g., <code>C:\unsafe path with space\program.exe</code> vs. <code>"C:\safe path with space\program.exe"</code>). (Citation: Help eliminate unquoted path) (stored in Windows Registry keys) An adversary can place an executable in a higher level directory of the path, and Windows will resolve that executable instead of the intended executable. For example, if the path in a shortcut is <code>C:\program files\myapp.exe</code>, an adversary may create a program at <code>C:\program.exe</code> that will be run instead of the intended program. (Citation: Windows Unquoted Services) (Citation: Windows Privilege Escalation Guide)

This technique can be used for persistence if executables are called on a regular basis, as well as privilege escalation if intercepted executables are started by a higher privileged process.

View in MITRE ATT&CK®

NIST 800-53 Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CA-07 Continuous Monitoring mitigates T1574.009 Path Interception by Unquoted Path
CM-06 Configuration Settings mitigates T1574.009 Path Interception by Unquoted Path
RA-05 Vulnerability Monitoring and Scanning mitigates T1574.009 Path Interception by Unquoted Path
CM-08 System Component Inventory mitigates T1574.009 Path Interception by Unquoted Path
SI-10 Information Input Validation mitigates T1574.009 Path Interception by Unquoted Path
SI-03 Malicious Code Protection mitigates T1574.009 Path Interception by Unquoted Path
SI-07 Software, Firmware, and Information Integrity mitigates T1574.009 Path Interception by Unquoted Path
CM-02 Baseline Configuration mitigates T1574.009 Path Interception by Unquoted Path
CM-02 Baseline Configuration mitigates T1574.009 Path Interception by Unquoted Path
CM-07 Least Functionality mitigates T1574.009 Path Interception by Unquoted Path
SI-04 System Monitoring mitigates T1574.009 Path Interception by Unquoted Path
AC-02 Account Management mitigates T1574.009 Path Interception by Unquoted Path
AC-03 Access Enforcement mitigates T1574.009 Path Interception by Unquoted Path
AC-04 Information Flow Enforcement mitigates T1574.009 Path Interception by Unquoted Path
AC-05 Separation of Duties mitigates T1574.009 Path Interception by Unquoted Path
AC-06 Least Privilege mitigates T1574.009 Path Interception by Unquoted Path