IIS Components (T1505.004)

View on ATT&CK

In Playbook

Associated Tactics

  • Persistence

Persistence (TA0003)

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

View on ATT&CK

Procedure Examples

Description Source(s)
Microsoft. (2017, June 16). ISAPI Extension Overview. Retrieved June 3, 2021. Microsoft ISAPI Extension Overview 2017
Microsoft. (2017, June 16). ISAPI Filter Overview. Retrieved June 3, 2021. Microsoft ISAPI Filter Overview 2017
Julien. (2011, February 2). IIS Backdoor. Retrieved June 3, 2021. IIS Backdoor 2011
Grunzweig, J. (2013, December 9). The Curious Case of the Malicious IIS Module. Retrieved June 3, 2021. Trustwave IIS Module 2013
Microsoft. (2017, June 16). Intercepting All Incoming IIS Requests. Retrieved June 3, 2021. Microsoft ISAPI Extension All Incoming 2017
Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, August 5). Threat Group-3390 Targets Organizations for Cyberespionage. Retrieved August 18, 2018. Dell TG-3390
MMPC. (2012, October 3). Malware signed with the Adobe code signing certificate. Retrieved June 3, 2021. MMPC ISAPI Filter 2012
Microsoft. (2007, November 24). IIS Modules Overview. Retrieved June 17, 2021. Microsoft IIS Modules Overview 2007
Hromcová, Z., Cherepanov, A. (2021). Anatomy of Native IIS Malware. Retrieved September 9, 2021. ESET IIS Malware 2021
Falcone, R. (2018, January 25). OilRig uses RGDoor IIS Backdoor on Targets in the Middle East. Retrieved July 6, 2018. Unit 42 RGDoor Jan 2018