Common Information
Type | Value |
---|---|
Value |
Service Execution - T1569.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may abuse the Windows service control manager to execute malicious commands or payloads. The Windows service control manager (<code>services.exe</code>) is an interface to manage and manipulate services.(Citation: Microsoft Service Control Manager) The service control manager is accessible to users via GUI components as well as system utilities such as <code>sc.exe</code> and [Net](https://attack.mitre.org/software/S0039). [PsExec](https://attack.mitre.org/software/S0029) can also be used to execute commands or payloads via a temporary Windows service created through the service control manager API.(Citation: Russinovich Sysinternals) Tools such as [PsExec](https://attack.mitre.org/software/S0029) and <code>sc.exe</code> can accept remote servers as arguments and may be used to conduct remote execution. Adversaries may leverage these mechanisms to execute malicious content. This can be done by either executing a new or modified service. This technique is the execution used in conjunction with [Windows Service](https://attack.mitre.org/techniques/T1543/003) during service persistence or privilege escalation. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2020-06-17 | 37 | Operation In(ter)ception: Aerospace and military companies in the crosshairs of cyberspies | WeLiveSecurity | ||
Details | Website | 2020-05-14 | 52 | Mikroceen: Spying backdoor leveraged in high‑profile networks in Central Asia | WeLiveSecurity | ||
Details | Website | 2020-05-13 | 66 | Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networks | WeLiveSecurity | ||
Details | Website | 2020-05-01 | 53 | Tales From the Trenches; a Lockbit Ransomware Story | McAfee Blog | ||
Details | Website | 2020-04-02 | 189 | Nemty Ransomware - Learning by Doing | McAfee Blog | ||
Details | Website | 2020-02-27 | 79 | “Higaisa(黑格莎)”组织近期攻击活动报告 | ||
Details | Website | 2019-12-02 | 15 | God save the queen [...] 'cause ransom is money - savethequeen encryptor | ||
Details | Website | 2019-11-05 | 6 | Buran Ransomware; the Evolution of VegaLocker | McAfee Blog | ||
Details | Website | 2019-10-17 | 37 | Operation Ghost: The Dukes aren’t back – they never left | WeLiveSecurity | ||
Details | Website | 2019-10-10 | 41 | ESET discovers Attor, a spy platform with curious GSM fingerprinting | WeLiveSecurity | ||
Details | Website | 2019-08-14 | 252 | In the Balkans, businesses are under fire from a double‑barreled weapon | WeLiveSecurity | ||
Details | Website | 2019-06-20 | 115 | LoudMiner: Cross‑platform mining in cracked VST software | WeLiveSecurity | ||
Details | Website | 2018-12-21 | 118 | The Christmas Card you never wanted - A new wave of Emotet is back to wreak havoc | ||
Details | Website | 2018-10-30 | 93 | Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims | McAfee Blog | ||
Details | Website | 2018-04-25 | 30 | Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide | ||
Details | Website | 2018-03-08 | 25 | Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant | McAfee Blog | ||
Details | Website | 2018-03-02 | 70 | McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups | McAfee Blog | ||
Details | Website | 2017-05-14 | 36 | WCry/WanaCry ransomware technical analysis |