T1543 Create or Modify System Process Mappings

Adversaries may create or modify system-level processes to repeatedly execute malicious payloads as part of persistence. When operating systems boot up, they can start processes that perform background system functions. On Windows and Linux, these system processes are referred to as services. (Citation: TechNet Services) On macOS, launchd processes known as Launch Daemon and Launch Agent are run to finish system initialization and load user specific parameters.(Citation: AppleDocs Launch Agent Daemons)

Adversaries may install new services, daemons, or agents that can be configured to execute at startup or a repeatable interval in order to establish persistence. Similarly, adversaries may modify existing services, daemons, or agents to achieve the same effect.

Services, daemons, or agents may be created with administrator privileges but executed under root/SYSTEM privileges. Adversaries may leverage this functionality to create or modify system processes in order to escalate privileges. (Citation: OSX Malware Detection).

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
AC-17 Remote Access Protects T1543 Create or Modify System Process
AC-2 Account Management Protects T1543 Create or Modify System Process
AC-3 Access Enforcement Protects T1543 Create or Modify System Process
AC-5 Separation of Duties Protects T1543 Create or Modify System Process
AC-6 Least Privilege Protects T1543 Create or Modify System Process
CA-7 Continuous Monitoring Protects T1543 Create or Modify System Process
CA-8 Penetration Testing Protects T1543 Create or Modify System Process
CM-11 User-installed Software Protects T1543 Create or Modify System Process
CM-2 Baseline Configuration Protects T1543 Create or Modify System Process
CM-3 Configuration Change Control Protects T1543 Create or Modify System Process
CM-5 Access Restrictions for Change Protects T1543 Create or Modify System Process
CM-6 Configuration Settings Protects T1543 Create or Modify System Process
CM-7 Least Functionality Protects T1543 Create or Modify System Process
IA-2 Identification and Authentication (organizational Users) Protects T1543 Create or Modify System Process
IA-4 Identifier Management Protects T1543 Create or Modify System Process
RA-5 Vulnerability Monitoring and Scanning Protects T1543 Create or Modify System Process
SA-22 Unsupported System Components Protects T1543 Create or Modify System Process
SI-16 Memory Protection Protects T1543 Create or Modify System Process
SI-3 Malicious Code Protection Protects T1543 Create or Modify System Process
SI-4 System Monitoring Protects T1543 Create or Modify System Process
SI-7 Software, Firmware, and Information Integrity Protects T1543 Create or Modify System Process
alerts_for_windows_machines Alerts for Windows Machines technique_scores T1543 Create or Modify System Process
azure_security_center_recommendations Azure Security Center Recommendations technique_scores T1543 Create or Modify System Process
azure_sentinel Azure Sentinel technique_scores T1543 Create or Modify System Process
microsoft_defender_for_identity Microsoft Defender for Identity technique_scores T1543 Create or Modify System Process
file_integrity_monitoring File Integrity Monitoring technique_scores T1543 Create or Modify System Process
azure_defender_for_app_service Azure Defender for App Service technique_scores T1543 Create or Modify System Process

ATT&CK Subtechniques

Technique ID Technique Name Number of Mappings
T1543.001 Launch Agent 7
T1543.004 Launch Daemon 7
T1543.002 Systemd Service 18
T1543.003 Windows Service 20