Adversaries may try to gather information about registered local system services. Adversaries may obtain information about services using tools as well as OS utility commands such as sc query
, tasklist /svc
, systemctl --type=service
, and net start
.
Adversaries may use the information from System Service Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
ID | Name | Description |
---|---|---|
G0018 | admin@338 |
admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to obtain information about services: |
G0006 | APT1 |
APT1 used the commands |
G0143 | Aquatic Panda |
Aquatic Panda has attempted to discover services for third party EDR products.[3] |
S0638 | Babuk |
Babuk can enumerate all services running on a compromised host.[4] |
S0127 | BBSRAT | |
S0570 | BitPaymer |
BitPaymer can enumerate existing Windows services on the host that are configured to run as LocalSystem.[6] |
G0060 | BRONZE BUTLER |
BRONZE BUTLER has used TROJ_GETVERSION to discover system services.[7] |
S0572 | Caterpillar WebShell |
Caterpillar WebShell can obtain a list of the services from a system.[8] |
G0114 | Chimera |
Chimera has used |
S0154 | Cobalt Strike |
Cobalt Strike can enumerate services on compromised hosts.[10] |
S0244 | Comnie |
Comnie runs the command: |
S0625 | Cuba |
Cuba can query service status using |
S0024 | Dyre |
Dyre has the ability to identify running services on a compromised host.[13] |
S0081 | Elise |
Elise executes |
S0082 | Emissary |
Emissary has the capability to execute the command |
S0091 | Epic |
Epic uses the |
S0049 | GeminiDuke |
GeminiDuke collects information on programs and services on the victim that are configured to automatically run at startup.[17] |
S0237 | GravityRAT |
GravityRAT has a feature to list the available services on the system.[18] |
S0342 | GreyEnergy |
GreyEnergy enumerates all Windows services.[19] |
S0431 | HotCroissant |
HotCroissant has the ability to retrieve a list of services on the infected host.[20] |
S0203 | Hydraq |
Hydraq creates a backdoor through which remote attackers can monitor services.[21][22] |
S0398 | HyperBro |
HyperBro can list all services and their configurations.[23] |
G0119 | Indrik Spider |
Indrik Spider has used the win32_service WMI class to retrieve a list of services from the system.[24] |
S0260 | InvisiMole |
InvisiMole can obtain running services on the victim.[25] |
S0015 | Ixeshe | |
S0201 | JPIN | |
S0283 | jRAT | |
G0004 | Ke3chang |
Ke3chang performs service discovery using |
G0094 | Kimsuky |
Kimsuky has used an instrumentor script to gather the names of all services running on a victim's system.[30] |
S0236 | Kwampirs |
Kwampirs collects a list of running services with the command |
S0582 | LookBack | |
S0039 | Net |
The |
G0049 | OilRig |
OilRig has used |
G0116 | Operation Wocao |
Operation Wocao has used the |
G0033 | Poseidon Group |
After compromising a victim, Poseidon Group discovers all running services.[36] |
S0378 | PoshC2 |
PoshC2 can enumerate service and service permission information.[37] |
S0629 | RainyDay |
RainyDay can create and register a service for execution.[38] |
S0241 | RATANKBA | |
S0496 | REvil | |
S0085 | S-Type | |
S0692 | SILENTTRINITY |
SILENTTRINITY can search for modifiable services that could be used for privilege escalation.[42] |
S0533 | SLOTHFULMEDIA |
SLOTHFULMEDIA has the capability to enumerate services.[43] |
S0615 | SombRAT | |
S0559 | SUNBURST |
SUNBURST collected a list of service names that were hashed using a FNV-1a + XOR algorithm to check against similarly-hashed hardcoded blocklists.[45] |
S0018 | Sykipot | |
S0242 | SynAck | |
S0057 | Tasklist |
Tasklist can be used to discover services running on a system.[49] |
S0266 | TrickBot |
TrickBot collects a list of install programs and services on the system’s machine.[50] |
G0010 | Turla |
Turla surveys a system upon check-in to discover running services and associated processes using the |
S0386 | Ursnif | |
S0180 | Volgmer |
Volgmer queries the system to identify existing services.[52] |
S0219 | WINERACK | |
S0086 | ZLib |
ZLib has the ability to discover and manipulate Windows services.[41] |
S0412 | ZxShell |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
ID | Data Source | Data Component |
---|---|---|
DS0017 | Command | Command Execution |
DS0009 | Process | Process Creation |
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained.
Monitor processes and command-line arguments for actions that could be taken to gather system information related to services. Remote access tools with built-in features may interact directly with the Windows API to gather information. Information may also be acquired through Windows system management tools such as Windows Management Instrumentation and PowerShell.