2020-06-18 01:57:35 +00:00
# T1007 - System Service Discovery
2020-09-29 13:53:28 +00:00
## [Description from ATT&CK](https://attack.mitre.org/techniques/T1007)
2025-02-13 22:03:40 +00:00
<blockquote>
2022-06-16 22:47:00 +00:00
2025-11-05 01:55:34 +00:00
Adversaries may try to gather information about registered local system services. Adversaries may obtain information about services using tools as well as OS utility commands such as <code>sc query</code>, <code>tasklist /svc</code>, <code>systemctl --type=service</code>, and <code>net start</code>. Adversaries may also gather information about schedule tasks via commands such as `schtasks` on Windows or `crontab -l` on Linux and macOS.(Citation: Elastic Security Labs GOSAR 2024)(Citation: SentinelLabs macOS Malware 2021)(Citation: Splunk Linux Gormir 2024)(Citation: Aquasec Kinsing 2020)
2025-02-13 22:03:40 +00:00
Adversaries may use the information from [System Service Discovery ](https://attack.mitre.org/techniques/T1007 ) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
</blockquote>
2020-06-18 01:57:35 +00:00
## Atomic Tests
- [Atomic Test #1 - System Service Discovery ](#atomic-test-1---system-service-discovery )
- [Atomic Test #2 - System Service Discovery - net.exe ](#atomic-test-2---system-service-discovery---netexe )
2023-11-13 21:46:56 +00:00
- [Atomic Test #3 - System Service Discovery - systemctl/service ](#atomic-test-3---system-service-discovery---systemctlservice )
2023-11-02 00:56:51 +00:00
2024-10-17 00:25:05 +00:00
- [Atomic Test #4 - Get-Service Execution ](#atomic-test-4---get-service-execution )
2020-06-18 01:57:35 +00:00
<br/>
## Atomic Test #1 - System Service Discovery
Identify system services.
Upon successful execution, cmd.exe will execute service commands with expected result to stdout.
2021-06-24 17:04:33 +00:00
2020-06-18 01:57:35 +00:00
**Supported Platforms: ** Windows
2021-06-24 17:04:33 +00:00
**auto_generated_guid: ** 89676ba1-b1f8-47ee-b940-2e1a113ebc71
2020-06-18 01:57:35 +00:00
#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
``` cmd
tasklist.exe
sc query
sc query state= all
```
<br/>
<br/>
## Atomic Test #2 - System Service Discovery - net.exe
Enumerates started system services using net.exe and writes them to a file. This technique has been used by multiple threat actors.
2022-12-14 20:35:27 +00:00
Upon successful execution, net.exe will run from cmd.exe that queries services. Expected output is to a txt file in in the temp directory called service-list.txt.
2021-06-24 17:04:33 +00:00
2020-06-18 01:57:35 +00:00
**Supported Platforms: ** Windows
2021-06-24 17:04:33 +00:00
**auto_generated_guid: ** 5f864a3f-8ce9-45c0-812c-bdf7d8aeacc3
2020-06-18 01:57:35 +00:00
#### Inputs:
2021-06-24 15:16:54 +00:00
| Name | Description | Type | Default Value |
2020-06-18 01:57:35 +00:00
|------|-------------|------|---------------|
2023-02-13 23:11:19 +00:00
| output_file | Path of file to hold net.exe output | path | %temp%\ ;service-list.txt|
2020-06-18 01:57:35 +00:00
#### Attack Commands: Run with `command_prompt`!
``` cmd
net.exe start >> #{output_file}
```
#### Cleanup Commands:
``` cmd
del /f /q /s #{output_file} > nul 2 >& 1
```
2022-04-29 21:06:05 +00:00
<br/>
<br/>
2023-11-13 21:46:56 +00:00
## Atomic Test #3 - System Service Discovery - systemctl/service
Enumerates system service using systemctl/service
2022-04-29 21:06:05 +00:00
**Supported Platforms: ** Linux
**auto_generated_guid: ** f4b26bce-4c2c-46c0-bcc5-fce062d38bef
#### Attack Commands: Run with `bash`!
``` bash
2023-11-13 21:46:56 +00:00
if [ " $( uname) " = 'FreeBSD' ] ; then service -e; else systemctl --type= service; fi ;
2023-11-02 00:56:51 +00:00
```
2024-10-17 00:25:05 +00:00
<br/>
<br/>
## Atomic Test #4 - Get-Service Execution
Executes the Get-Service cmdlet to gather objects representing all services on the local system.
**Supported Platforms: ** Windows
**auto_generated_guid: ** 51f17016-d8fa-4360-888a-df4bf92c4a04
#### Attack Commands: Run with `command_prompt`!
``` cmd
powershell.exe Get-Service
```
2020-06-18 01:57:35 +00:00
<br/>