T1574.009 Path Interception by Unquoted Path

Adversaries may execute their own malicious payloads by hijacking vulnerable file path references. Adversaries can take advantage of paths that lack surrounding quotations by placing an executable in a higher level directory within the path, so that Windows will choose the adversary's executable to launch.

Service paths (Citation: Microsoft CurrentControlSet Services) and shortcut paths may also be vulnerable to path interception if the path has one or more spaces and is not surrounded by quotation marks (e.g., <code>C:\unsafe path with space\program.exe</code> vs. <code>"C:\safe path with space\program.exe"</code>). (Citation: Help eliminate unquoted path) (stored in Windows Registry keys) An adversary can place an executable in a higher level directory of the path, and Windows will resolve that executable instead of the intended executable. For example, if the path in a shortcut is <code>C:\program files\myapp.exe</code>, an adversary may create a program at <code>C:\program.exe</code> that will be run instead of the intended program. (Citation: Windows Unquoted Services) (Citation: Windows Privilege Escalation Guide)

This technique can be used for persistence if executables are called on a regular basis, as well as privilege escalation if intercepted executables are started by a higher privileged process.

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.PS-01.08 End-user device protection Mitigates T1574.009 Path Interception by Unquoted Path
Comments
This diagnostic statement protects endpoints from certain types of behaviors related to process injection/memory tampering through configuration requirements, connection requirements, and other mechanisms to protect network, application, and data integrity.
References

    NIST 800-53 Mappings

    Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
    CA-07 Continuous Monitoring mitigates T1574.009 Path Interception by Unquoted Path
    CM-06 Configuration Settings mitigates T1574.009 Path Interception by Unquoted Path
    RA-05 Vulnerability Monitoring and Scanning mitigates T1574.009 Path Interception by Unquoted Path
    CM-08 System Component Inventory mitigates T1574.009 Path Interception by Unquoted Path
    SI-10 Information Input Validation mitigates T1574.009 Path Interception by Unquoted Path
    SI-03 Malicious Code Protection mitigates T1574.009 Path Interception by Unquoted Path
    SI-07 Software, Firmware, and Information Integrity mitigates T1574.009 Path Interception by Unquoted Path
    CM-02 Baseline Configuration mitigates T1574.009 Path Interception by Unquoted Path
    CM-02 Baseline Configuration mitigates T1574.009 Path Interception by Unquoted Path
    CM-07 Least Functionality mitigates T1574.009 Path Interception by Unquoted Path
    SI-04 System Monitoring mitigates T1574.009 Path Interception by Unquoted Path
    AC-02 Account Management mitigates T1574.009 Path Interception by Unquoted Path
    AC-03 Access Enforcement mitigates T1574.009 Path Interception by Unquoted Path
    AC-04 Information Flow Enforcement mitigates T1574.009 Path Interception by Unquoted Path
    AC-05 Separation of Duties mitigates T1574.009 Path Interception by Unquoted Path
    AC-06 Least Privilege mitigates T1574.009 Path Interception by Unquoted Path

    Azure Mappings

    Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
    file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring technique_scores T1574.009 Path Interception by Unquoted Path
    Comments
    This control can detect file changes on VMs indicative of Path Interception by Unquoted Path.
    References
    defender_for_app_service Microsoft Defender for Cloud: Defender for App Service technique_scores T1574.009 Path Interception by Unquoted Path
    Comments
    This control analyzes host data to detect execution of known malicious PowerShell PowerSploit cmdlets. This covers execution of these sub-techniques via the Privesc-PowerUp modules, but does not address other procedures, and temporal factor is unknown, resulting in a Minimal score.
    References