Skip to content

Latest commit

 

History

History
55 lines (43 loc) · 2.3 KB

modify-existing-service.md

File metadata and controls

55 lines (43 loc) · 2.3 KB
ID F0011
Objective(s) Persistence, Privilege Escalation
Related ATT&CK Techniques Create or Modify System Process::Windows Service (T1543.003)
Version 2.0
Created 2 August 2022
Last Modified 21 November 2022

Modify Existing Service

Malware may modify an existing service to gain persistence. Modification may include disabling a service.

See ATT&CK: Create or Modify System Process::Windows Service (T1543.003).

Use in Malware

Name Date Method Description
Poison-Ivy 2005 -- After the Poison-Ivy server is running on the target machine, the attacker can use a Windows GUI client to control the target computer. [1]
YiSpecter 2015 -- Hijacks other installed applications' launch routines to use "ADPage" (an installed malicious app) to display advertisements [2]
BlackEnergy 2007 -- Locates an inactive driver service to Hijack and set it to start automatically [3]
Conficker 2008 -- Copies itself into the $systemroot%\system32 directory and registers as a service [4]
Shamoon 2012 -- Shamoon enables the RemoteRegistry service to allow remote registry modification [5]

References

[1] https://www.cyber.nj.gov/threat-profiles/trojan-variants/poison-ivy

[2] http://researchcenter.paloaltonetworks.com/2015/10/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/

[3] https://blog-assets.f-secure.com/wp-content/uploads/2019/10/15163408/BlackEnergy_Quedagh.pdf

[4] https://en.wikipedia.org/wiki/Conficker

[5] https://www.mcafee.com/blogs/other-blogs/mcafee-labs/shamoon-returns-to-wipe-systems-in-middle-east-europe/