# T1007 - System Service Discovery ## [Description from ATT&CK](https://attack.mitre.org/techniques/T1007)
Adversaries may try to gather information about registered local system services. Adversaries may obtain information about services using tools as well as OS utility commands such as sc query, tasklist /svc, systemctl --type=service, and net start. Adversaries may also gather information about schedule tasks via commands such as `schtasks` on Windows or `crontab -l` on Linux and macOS.(Citation: Elastic Security Labs GOSAR 2024)(Citation: SentinelLabs macOS Malware 2021)(Citation: Splunk Linux Gormir 2024)(Citation: Aquasec Kinsing 2020) Adversaries may use the information from [System Service Discovery](https://attack.mitre.org/techniques/T1007) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
## Atomic Tests - [Atomic Test #1 - System Service Discovery](#atomic-test-1---system-service-discovery) - [Atomic Test #2 - System Service Discovery - net.exe](#atomic-test-2---system-service-discovery---netexe) - [Atomic Test #3 - System Service Discovery - systemctl/service](#atomic-test-3---system-service-discovery---systemctlservice) - [Atomic Test #4 - Get-Service Execution](#atomic-test-4---get-service-execution)
## Atomic Test #1 - System Service Discovery Identify system services. Upon successful execution, cmd.exe will execute service commands with expected result to stdout. **Supported Platforms:** Windows **auto_generated_guid:** 89676ba1-b1f8-47ee-b940-2e1a113ebc71 #### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin) ```cmd tasklist.exe sc query sc query state= all ```

## Atomic Test #2 - System Service Discovery - net.exe Enumerates started system services using net.exe and writes them to a file. This technique has been used by multiple threat actors. Upon successful execution, net.exe will run from cmd.exe that queries services. Expected output is to a txt file in in the temp directory called service-list.txt. **Supported Platforms:** Windows **auto_generated_guid:** 5f864a3f-8ce9-45c0-812c-bdf7d8aeacc3 #### Inputs: | Name | Description | Type | Default Value | |------|-------------|------|---------------| | output_file | Path of file to hold net.exe output | path | %temp%\service-list.txt| #### Attack Commands: Run with `command_prompt`! ```cmd net.exe start >> #{output_file} ``` #### Cleanup Commands: ```cmd del /f /q /s #{output_file} >nul 2>&1 ```

## Atomic Test #3 - System Service Discovery - systemctl/service Enumerates system service using systemctl/service **Supported Platforms:** Linux **auto_generated_guid:** f4b26bce-4c2c-46c0-bcc5-fce062d38bef #### Attack Commands: Run with `bash`! ```bash if [ "$(uname)" = 'FreeBSD' ]; then service -e; else systemctl --type=service; fi; ```

## Atomic Test #4 - Get-Service Execution Executes the Get-Service cmdlet to gather objects representing all services on the local system. **Supported Platforms:** Windows **auto_generated_guid:** 51f17016-d8fa-4360-888a-df4bf92c4a04 #### Attack Commands: Run with `command_prompt`! ```cmd powershell.exe Get-Service ```