2.5 KiB
T1007 - System Service Discovery
Description from ATT&CK
Adversaries may try to gather information about registered local system services. Adversaries may obtain information about services using tools as well as OS utility commands such assc query,tasklist /svc,systemctl --type=service, andnet start.Adversaries may use the information from System Service Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
Atomic Tests
Atomic Test #1 - System Service Discovery
Identify system services.
Upon successful execution, cmd.exe will execute service commands with expected result to stdout.
Supported Platforms: Windows
auto_generated_guid: 89676ba1-b1f8-47ee-b940-2e1a113ebc71
Attack Commands: Run with command_prompt! Elevation Required (e.g. root or admin)
tasklist.exe
sc query
sc query state= all
Atomic Test #2 - System Service Discovery - net.exe
Enumerates started system services using net.exe and writes them to a file. This technique has been used by multiple threat actors.
Upon successful execution, net.exe will run from cmd.exe that queries services. Expected output is to a txt file in c:\Windows\Temp\service-list.txt.s
Supported Platforms: Windows
auto_generated_guid: 5f864a3f-8ce9-45c0-812c-bdf7d8aeacc3
Inputs:
| Name | Description | Type | Default Value |
|---|---|---|---|
| output_file | Path of file to hold net.exe output | Path | C:\Windows\Temp\service-list.txt |
Attack Commands: Run with command_prompt!
net.exe start >> #{output_file}
Cleanup Commands:
del /f /q /s #{output_file} >nul 2>&1
Atomic Test #3 - System Service Discovery - systemctl
Enumerates system service using systemctl
Supported Platforms: Linux
auto_generated_guid: f4b26bce-4c2c-46c0-bcc5-fce062d38bef
Attack Commands: Run with bash!
systemctl --type=service