Modify Existing Service
ID: T1031 Tactic: Persistence
Windows service configuration information, including the file path to the service's executable or recovery programs//commands, is stored in the Registry. Service configurations can be modified using utilities such as sc.exe and Reg.
Adversaries can modify an existing service to persist malware on a system by using system utilities or by using custom tools to interact with the Windows API. Use of existing services is a type of Masquerading that make detection analysis more challenging. Modifying existing services may interrupt their functionality or may enable services that are disabled or otherwise not commonly used.
Adversaries may also intentionally corrupt or kills services to execute malicious recovery programs/commands.
Last updated