Adversaries may create or modify system-level processes to repeatedly execute malicious payloads as part of persistence. When operating systems boot up, they can start processes that perform background system functions. On Windows and Linux, these system processes are referred to as services. (Citation: TechNet Services) On macOS, launchd processes known as Launch Daemon and Launch Agent are run to finish system initialization and load user specific parameters.(Citation: AppleDocs Launch Agent Daemons)
Adversaries may install new services, daemons, or agents that can be configured to execute at startup or a repeatable interval in order to establish persistence. Similarly, adversaries may modify existing services, daemons, or agents to achieve the same effect.
Services, daemons, or agents may be created with administrator privileges but executed under root/SYSTEM privileges. Adversaries may leverage this functionality to create or modify system processes in order to escalate privileges. (Citation: OSX Malware Detection).
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
action.hacking.variety.Abuse of functionality | Abuse of functionality | related-to | T1543 | Create or Modify System Process | |
action.hacking.variety.Use of backdoor or C2 | Use of Backdoor or C2 channel | related-to | T1543 | Create or Modify System Process | |
action.hacking.vector.Backdoor or C2 | Backdoor or command and control channel | related-to | T1543 | Create or Modify System Process | |
action.malware.variety.Backdoor | Backdoor (enable remote access). Child of 'RAT' when combined with 'Trojan' | related-to | T1543 | Create or Modify System Process | |
action.malware.variety.Rootkit | Rootkit (maintain local privileges and stealth) | related-to | T1543 | Create or Modify System Process |
Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
amazon_inspector | Amazon Inspector | technique_scores | T1543 | Create or Modify System Process |
Comments
The Amazon Inspector Best Practices assessment package can assess security control "Configure permissions for system directories" that prevents privilege escalation by local users and ensures only the root account can modify/execute system configuration information and binaries. Amazon Inspector does not directly protect against system modifications rather it just checks to see if security controls are in place which can inform decisions around hardening the system. Furthermore, Amazon Inspector only supports a subset of the sub-techniques for this technique. Due to these things and the fact the security control is only supported for Linux platforms, the score is Minimal.
References
|
Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1543.001 | Launch Agent | 8 |
T1543.004 | Launch Daemon | 8 |
T1543.002 | Systemd Service | 18 |
T1543.003 | Windows Service | 17 |