Path Interception by Search Order Hijacking (T1574.008)

View on ATT&CK

In Playbook

Associated Tactics

  • Persistence
  • Privilege Escalation
  • Defense Evasion

Persistence (TA0003)

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

View on ATT&CK

Procedure Examples

Description Source(s)
Microsoft. (2011, October 24). Environment Property. Retrieved July 27, 2016. Microsoft Environment Property
Microsoft. (n.d.). CreateProcess function. Retrieved September 12, 2024. Microsoft CreateProcess
Microsoft. (n.d.). WinExec function. Retrieved September 12, 2024. Microsoft WinExec
Tim Hill. (2014, February 2). The Windows NT Command Shell. Retrieved December 5, 2014. Windows NT Command Shell