Windows Service (T1543.003)

View on ATT&CK

In Playbook

Associated Tactics

  • Persistence
  • Privilege Escalation

Persistence (TA0003)

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

View on ATT&CK

Procedure Examples

Description Source(s)
Hardy, T. & Hall, J. (2018, February 15). Use Windows Event Forwarding to help with intrusion detection. Retrieved August 7, 2018. Microsoft Windows Event Forwarding FEB 2018
Hromcova, Z. and Cherpanov, A. (2020, June). INVISIMOLE: THE HIDDEN PART OF THE STORY. Retrieved July 16, 2020. ESET InvisiMole June 2020
Joshua Wright. (2020, October 13). Retrieved March 22, 2024. SANS 1
Joshua Wright. (2020, October 14). Retrieved March 22, 2024. SANS 2
Microsoft. (n.d.). Services. Retrieved June 7, 2016. TechNet Services
Miroshnikov, A. & Hall, J. (2017, April 18). 4697(S): A service was installed in the system. Retrieved August 7, 2018. Microsoft 4697 APR 2017
Nicolas Falliere, Liam O. Murchu, Eric Chien. (2011, February). W32.Stuxnet Dossier. Retrieved December 7, 2020. Symantec W.32 Stuxnet Dossier
Reichel, D. and Idrizovic, E. (2020, June 17). AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations. Retrieved March 16, 2021. Unit42 AcidBox June 2020
Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016. TechNet Autoruns
Thomas, W. et al. (2022, February 25). CrowdStrike Falcon Protects from New Wiper Malware Used in Ukraine Cyberattacks. Retrieved March 25, 2022. Crowdstrike DriveSlayer February 2022