Services Registry Permissions Weakness (T1574.011)

View on ATT&CK

In Playbook

Associated Tactics

  • Persistence
  • Privilege Escalation
  • Defense Evasion

Persistence (TA0003)

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

View on ATT&CK

Procedure Examples

Description Source(s)
@r0wdy_. (2017, November 30). Service Recovery Parameters. Retrieved September 12, 2024. Tweet Registry Perms Weakness
Clément Labro. (2020, November 12). Windows RpcEptMapper Service Insecure Registry Permissions EoP. Retrieved August 25, 2021. insecure_reg_perms
Hull, D.. (2014, May 3). Kansa: Service related collectors and analysis. Retrieved October 10, 2019. Kansa Service related collectors
Lawrence Abrams. (2004, September 10). How Malware hides and is installed as a Service. Retrieved August 30, 2021. malware_hides_service
Mark Russinovich. (2019, June 28). Autoruns for Windows v13.96. Retrieved March 13, 2020. Autoruns for Windows
Microsoft. (2018, May 31). Registry Key Security and Access Rights. Retrieved March 16, 2017. Registry Key Security
Microsoft. (2021, August 5). HKLM\SYSTEM\CurrentControlSet\Services Registry Tree. Retrieved August 25, 2021. microsoft_services_registry_tree
Trend Micro. (2012, October 9). TROJ_ZEGOST. Retrieved September 2, 2021. troj_zegost