Common Information
Type | Value |
---|---|
Value |
Service Execution - T1569.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may abuse the Windows service control manager to execute malicious commands or payloads. The Windows service control manager (<code>services.exe</code>) is an interface to manage and manipulate services.(Citation: Microsoft Service Control Manager) The service control manager is accessible to users via GUI components as well as system utilities such as <code>sc.exe</code> and [Net](https://attack.mitre.org/software/S0039). [PsExec](https://attack.mitre.org/software/S0029) can also be used to execute commands or payloads via a temporary Windows service created through the service control manager API.(Citation: Russinovich Sysinternals) Tools such as [PsExec](https://attack.mitre.org/software/S0029) and <code>sc.exe</code> can accept remote servers as arguments and may be used to conduct remote execution. Adversaries may leverage these mechanisms to execute malicious content. This can be done by either executing a new or modified service. This technique is the execution used in conjunction with [Windows Service](https://attack.mitre.org/techniques/T1543/003) during service persistence or privilege escalation. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2021-04-08 | 54 | (Are you) afreight of the dark? Watch out for Vyveva, new Lazarus backdoor | WeLiveSecurity | ||
Details | Website | 2021-04-06 | 71 | McAfee Defender’s Blog: Cuba Ransomware Campaign | McAfee Blog | ||
Details | Website | 2021-03-24 | 10 | Hunting and detecting Cobalt Strike | ||
Details | Website | 2021-03-16 | 92 | 日本の製造業を狙うTickグループ - セキュリティ事業 - マクニカ | ||
Details | Website | 2021-02-25 | 161 | Lazarus targets defense industry with ThreatNeedle | ||
Details | Website | 2021-02-25 | 190 | So Unchill: Melting UNC2198 ICEDID to Ransomware Operations | Mandiant | ||
Details | Website | 2021-01-27 | 20 | CrimsonIAS: Listening for an 3v1l User | ||
Details | Website | 2021-01-12 | 216 | Abusing cloud services to fly under the radar | ||
Details | Website | 2021-01-12 | 215 | Abusing cloud services to fly under the radar | ||
Details | Website | 2020-12-23 | 112 | Lazarus covets COVID-19-related intelligence | ||
Details | Website | 2020-12-17 | 91 | Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations | CISA | ||
Details | Website | 2020-12-16 | 43 | UNC2452 Threat Actor Group Threat Intel Advisory | Threat Intelligence | CloudSEK | ||
Details | Website | 2020-12-14 | 220 | Carbanak/ FIN7 Crime Gang Threat Intel Advisory | Threat Intelligence | CloudSEK | ||
Details | Website | 2020-12-13 | 49 | SolarWinds Supply Chain Attack Uses SUNBURST Backdoor | ||
Details | Website | 2020-11-18 | 40 | Reversing Ryuk | ||
Details | Website | 2020-10-28 | 34 | Turla/Belugasturgeon Compromises Government | Accenture | ||
Details | Website | 2020-10-27 | 49 | North Korean Advanced Persistent Threat Focus: Kimsuky | CISA | ||
Details | Website | 2020-10-13 | 80 | Lemon Duck brings cryptocurrency miners back into the spotlight | ||
Details | Website | 2020-09-23 | 26 | Your best defense against ransomware: Find the early warning signs - Help Net Security | ||
Details | Website | 2020-09-08 | 305 | ShadowPad: новая активность группировки Winnti | ||
Details | Website | 2020-08-03 | 36 | McAfee Defender’s Blog: NetWalker | McAfee Blog | ||
Details | Website | 2020-08-03 | 46 | Take a "NetWalk" on the Wild Side | McAfee Blog | ||
Details | Website | 2020-07-23 | 39 | WastedLocker Ransomware: Abusing ADS and NTFS File Attributes - SentinelLabs | ||
Details | Website | 2020-07-22 | 187 | Prometei botnet and its quest for Monero | ||
Details | Website | 2020-06-18 | 76 | Digging up InvisiMole’s hidden arsenal | WeLiveSecurity |