T1036.004 Masquerade Task or Service
Adversaries may attempt to manipulate the name of a task or service to make it appear legitimate or benign. Tasks/services executed by the Task Scheduler or systemd will typically be given a name and/or description.12 Windows services will have a service name as well as a display name. Many benign tasks and services exist that have commonly associated names. Adversaries may give tasks or services names that are similar or identical to those of legitimate ones.
Tasks or services contain other fields, such as a description, that adversaries may attempt to make appear legitimate.34
Item | Value |
---|---|
ID | T1036.004 |
Sub-techniques | T1036.001, T1036.002, T1036.003, T1036.004, T1036.005, T1036.006, T1036.007 |
Tactics | TA0005 |
Platforms | Linux, Windows, macOS |
Permissions required | Administrator, SYSTEM, User |
Version | 1.1 |
Created | 10 February 2020 |
Last Modified | 18 October 2021 |
Procedure Examples
ID | Name | Description |
---|---|---|
G0099 | APT-C-36 | APT-C-36 has disguised its scheduled tasks as those used by Google.56 |
G0016 | APT29 | APT29 named tasks \Microsoft\Windows\SoftwareProtectionPlatform\EventCacheManager in order to appear legitimate.51 |
G0050 | APT32 | APT32 has used hidden or non-printing characters to help masquerade service names, such as appending a Unicode no-break space character to a legitimate service name. APT32 has also impersonated the legitimate Flash installer file name “install_flashplayer.exe”.59 |
G0096 | APT41 | APT41 has created services to appear as benign system tools.53 |
S0438 | Attor | Attor‘s dispatcher disguises itself as a legitimate task (i.e., the task name and description appear legitimate).35 |
G0135 | BackdoorDiplomacy | BackdoorDiplomacy has disguised their backdoor droppers with naming conventions designed to blend into normal operations.27 |
S0534 | Bazar | Bazar can create a task named to appear benign.33 |
S0471 | build_downer | build_downer has added itself to the Registry Run key as “NVIDIA” to appear legitimate.32 |
G0008 | Carbanak | Carbanak has copied legitimate service names to use for malicious services.58 |
S0261 | Catchamas | Catchamas adds a new service named NetAdapter in an apparent attempt to masquerade as a legitimate service.23 |
S0126 | ComRAT | ComRAT has used a task name associated with Windows SQM Consolidator.20 |
S0538 | Crutch | Crutch has established persistence with a scheduled task impersonating the Outlook item finder.25 |
S0527 | CSPY Downloader | CSPY Downloader has attempted to appear as a legitimate Windows service with a fake description claiming it is used to support packed applications.5 |
S0554 | Egregor | Egregor has masqueraded the svchost.exe process to exfiltrate data.13 |
S0343 | Exaramel for Windows | The Exaramel for Windows dropper creates and starts a Windows service named wsmprovav with the description “Windows Check AV” in an apparent attempt to masquerade as a legitimate service.28 |
G0037 | FIN6 | FIN6 has renamed the “psexec” service name to “mstdc” to masquerade as a legitimate Windows service.64 |
G0046 | FIN7 | FIN7 has created a scheduled task named “AdobeFlashSync” to establish persistence.57 |
G0117 | Fox Kitten | Fox Kitten has named the task for a reverse proxy lpupdate to appear legitimate.55 |
S0410 | Fysbis | Fysbis has masqueraded as the rsyncd and dbus-inotifier services.4 |
S0588 | GoldMax | GoldMax has impersonated systems management software to avoid detection.17 |
S0690 | Green Lambert | Green Lambert has created a new executable named Software Update Check to appear legitimate.910 |
G0126 | Higaisa | Higaisa named a shellcode loader binary svchast.exe to spoof the legitimate svchost.exe .6263 |
S0601 | Hildegard | Hildegard has disguised itself as a known Linux process.49 |
S0259 | InnaputRAT | InnaputRAT variants have attempted to appear legitimate by adding a new service named OfficeUpdateService.26 |
S0260 | InvisiMole | InvisiMole has attempted to disguise itself by registering under a seemingly legitimate service name.12 |
S0581 | IronNetInjector | IronNetInjector has been disguised as a legitimate service using the name PythonUpdateSrvc.6 |
S0607 | KillDisk | KillDisk registers as a service under the Plug-And-Play Support name.7 |
G0094 | Kimsuky | Kimsuky has disguised services to appear as benign software or related to operating system functions.54 |
S0356 | KONNI | KONNI has pretended to be the xmlProv Network Provisioning service.14 |
S0236 | Kwampirs | Kwampirs establishes persistence by adding a new service with the display name “WMI Performance Adapter Extension” in an attempt to masquerade as a legitimate WMI service.24 |
G0032 | Lazarus Group | Lazarus Group has used a scheduled task named SRCheck to mask the execution of a malicious .dll.52 |
S0409 | Machete | Machete renamed task names to masquerade as legitimate Google Chrome, Java, Dropbox, Adobe Reader and Python tasks.34 |
S0449 | Maze | Maze operators have created scheduled tasks masquerading as “Windows Update Security”, “Windows Update Security Patches”, and “Google Chrome Security Update” designed to launch the ransomware.8 |
S0688 | Meteor | Meteor has been disguised as the Windows Power Efficiency Diagnostics report tool.44 |
G0019 | Naikon | Naikon renamed a malicious service taskmgr to appear to be a legitimate version of Task Manager.11 |
S0630 | Nebulae | Nebulae has created a service named “Windows Update Agent1” to appear legitimate.11 |
S0118 | Nidiran | Nidiran can create a new service named msamger (Microsoft Security Accounts Manager), which mimics the legitimate Microsoft database by the same name.1819 |
S0439 | Okrum | Okrum can establish persistence by adding a new service NtmsSvc with the display name Removable Storage to masquerade as a legitimate Removable Storage Manager.21 |
S0352 | OSX_OCEANLOTUS.D | OSX_OCEANLOTUS.D has disguised its app bundle by adding special characters to the filename and using the icon for legitimate Word documents.22 |
S0013 | PlugX | In one instance, menuPass added PlugX as a service with a display name of “Corel Writing Tools Utility.”38 |
S0223 | POWERSTATS | POWERSTATS has created a scheduled task named “MicrosoftEdge” to establish persistence.37 |
G0056 | PROMETHIUM | PROMETHIUM has named services to appear legitimate.4748 |
S0629 | RainyDay | RainyDay has named services and scheduled tasks to appear benign including “ChromeCheck” and “googleupdate.”11 |
S0169 | RawPOS | New services created by RawPOS are made to appear like legitimate Windows services, with names such as “Windows Management Help Service”, “Microsoft Support”, and “Windows Advanced Task Manager”.293031 |
S0495 | RDAT | RDAT has used Windows Video Service as a name for malicious services.39 |
S0148 | RTM | RTM has named the scheduled task it creates “Windows Update”.15 |
S0345 | Seasalt | Seasalt has masqueraded as a service called “SaSaut” with a display name of “System Authorization Service” in an apparent attempt to masquerade as a legitimate service.42 |
S0140 | Shamoon | Shamoon creates a new service named “ntssrv” that attempts to appear legitimate; the service’s display name is “Microsoft Network Realtime Inspection Service” and its description is “Helps guard against time change attempts targeting known and newly discovered vulnerabilities in network time protocols.” Newer versions create the “MaintenaceSrv” service, which misspells the word “maintenance.”316 |
S0444 | ShimRat | ShimRat can impersonate Windows services and antivirus products to avoid detection on compromised systems.43 |
S0533 | SLOTHFULMEDIA | SLOTHFULMEDIA has named a service it establishes on victim machines as “TaskFrame” to hide its malicious purpose.36 |
S0491 | StrongPity | StrongPity has named services to appear legitimate.4748 |
S0668 | TinyTurla | TinyTurla has mimicked an existing Windows service by being installed as Windows Time Service .46 |
S0178 | Truvasys | To establish persistence, Truvasys adds a Registry Run key with a value “TaskMgr” in an attempt to masquerade as the legitimate Windows Task Manager.45 |
S0647 | Turian | Turian can disguise as a legitimate service to blend into normal operations.27 |
S0180 | Volgmer | Some Volgmer variants add new services with display names generated by a list of hard-coded strings such as Application, Background, Security, and Windows, presumably as a way to masquerade as a legitimate service.4041 |
G0102 | Wizard Spider | Wizard Spider has used scheduled tasks to install TrickBot, using task names to appear legitimate such as WinDotNet, GoogleTask, or Sysnetsf.60 It has also used common document file names for other malware binaries.61 |
G0128 | ZIRCONIUM | ZIRCONIUM has created a run key named Dropbox Update Setup to mask a persistence mechanism for a malicious binary.50 |
Detection
ID | Data Source | Data Component |
---|---|---|
DS0017 | Command | Command Execution |
DS0003 | Scheduled Job | Scheduled Job Metadata |
DS0019 | Service | Service Creation |
References
-
Freedesktop.org. (n.d.). systemd.service — Service unit configuration. Retrieved March 16, 2020. ↩
-
Falcone, R.. (2016, November 30). Shamoon 2: Return of the Disttrack Wiper. Retrieved January 11, 2017. ↩↩
-
Doctor Web. (2014, November 21). Linux.BackDoor.Fysbis.1. Retrieved December 7, 2017. ↩↩
-
Dahan, A. et al. (2020, November 2). Back to the Future: Inside the Kimsuky KGH Spyware Suite. Retrieved November 6, 2020. ↩
-
Reichel, D. (2021, February 19). IronNetInjector: Turla’s New Malware Loading Tool. Retrieved February 24, 2021. ↩
-
Cherepanov, A.. (2016, December 13). The rise of TeleBots: Analyzing disruptive KillDisk attacks. Retrieved June 10, 2020. ↩
-
Brandt, A., Mackenzie, P.. (2020, September 17). Maze Attackers Adopt Ragnar Locker Virtual Machine Technique. Retrieved October 9, 2020. ↩
-
Sandvik, Runa. (2021, October 1). Made In America: Green Lambert for OS X. Retrieved March 21, 2022. ↩
-
Sandvik, Runa. (2021, October 18). Green Lambert and ATT&CK. Retrieved March 21, 2022. ↩
-
Vrabie, V. (2021, April 23). NAIKON – Traces from a Military Cyber-Espionage Operation. Retrieved June 29, 2021. ↩↩↩
-
Hromcova, Z. and Cherpanov, A. (2020, June). INVISIMOLE: THE HIDDEN PART OF THE STORY. Retrieved July 16, 2020. ↩
-
Bichet, J. (2020, November 12). Egregor – Prolock: Fraternal Twins ?. Retrieved January 6, 2021. ↩
-
Threat Intelligence Team. (2021, August 23). New variant of Konni malware used in campaign targetting Russia. Retrieved January 5, 2022. ↩
-
Duncan, B., Harbison, M. (2019, January 23). Russian Language Malspam Pushing Redaman Banking Malware. Retrieved June 16, 2020. ↩
-
Mundo, A., Roccia, T., Saavedra-Morales, J., Beek, C.. (2018, December 14). Shamoon Returns to Wipe Systems in Middle East, Europe . Retrieved May 29, 2020. ↩
-
Nafisi, R., Lelli, A. (2021, March 4). GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence. Retrieved March 8, 2021. ↩
-
Sponchioni, R.. (2016, March 11). Backdoor.Nidiran. Retrieved August 3, 2016. ↩
-
Microsoft. (2006, October 30). How to use the SysKey utility to secure the Windows Security Accounts Manager database. Retrieved August 3, 2016. ↩
-
Faou, M. (2020, May). From Agent.btz to ComRAT v4: A ten-year journey. Retrieved June 15, 2020. ↩
-
Hromcova, Z. (2019, July). OKRUM AND KETRICAN: AN OVERVIEW OF RECENT KE3CHANG GROUP ACTIVITY. Retrieved May 6, 2020. ↩
-
Magisa, L. (2020, November 27). New MacOS Backdoor Connected to OceanLotus Surfaces. Retrieved December 2, 2020. ↩
-
Balanza, M. (2018, April 02). Infostealer.Catchamas. Retrieved July 10, 2018. ↩
-
Symantec Security Response Attack Investigation Team. (2018, April 23). New Orangeworm attack group targets the healthcare sector in the U.S., Europe, and Asia. Retrieved May 8, 2018. ↩
-
Faou, M. (2020, December 2). Turla Crutch: Keeping the “back door” open. Retrieved December 4, 2020. ↩
-
ASERT Team. (2018, April 04). Innaput Actors Utilize Remote Access Trojan Since 2016, Presumably Targeting Victim Files. Retrieved July 9, 2018. ↩
-
Adam Burgher. (2021, June 10). BackdoorDiplomacy: Upgrading from Quarian to Turian. Retrieved September 1, 2021 ↩↩
-
Cherepanov, A., Lipovsky, R. (2018, October 11). New TeleBots backdoor: First evidence linking Industroyer to NotPetya. Retrieved November 27, 2018. ↩
-
Nesbit, B. and Ackerman, D. (2017, January). Malware Analysis Report - RawPOS Malware: Deconstructing an Intruder’s Toolkit. Retrieved October 4, 2017. ↩
-
TrendLabs Security Intelligence Blog. (2015, April). RawPOS Technical Brief. Retrieved October 4, 2017. ↩
-
Bromiley, M. and Lewis, P. (2016, October 7). Attacking the Hospitality and Gaming Industries: Tracking an Attacker Around the World in 7 Years. Retrieved October 6, 2017. ↩
-
Chen, J. et al. (2019, November). Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data. Retrieved June 9, 2020. ↩
-
Cybereason Nocturnus. (2020, July 16). A BAZAR OF TRICKS: FOLLOWING TEAM9’S DEVELOPMENT CYCLES. Retrieved November 18, 2020. ↩
-
ESET. (2019, July). MACHETE JUST GOT SHARPER Venezuelan government institutions under attack. Retrieved September 13, 2019. ↩
-
Hromcova, Z. (2019, October). AT COMMANDS, TOR-BASED COMMUNICATIONS: MEET ATTOR, A FANTASY CREATURE AND ALSO A SPY PLATFORM. Retrieved May 6, 2020. ↩
-
DHS/CISA, Cyber National Mission Force. (2020, October 1). Malware Analysis Report (MAR) MAR-10303705-1.v1 – Remote Access Trojan: SLOTHFULMEDIA. Retrieved October 2, 2020. ↩
-
ClearSky Cyber Security. (2018, November). MuddyWater Operations in Lebanon and Oman: Using an Israeli compromised domain for a two-stage campaign. Retrieved November 29, 2018. ↩
-
FireEye iSIGHT Intelligence. (2017, April 6). APT10 (MenuPass Group): New Tools, Global Campaign Latest Manifestation of Longstanding Threat. Retrieved June 29, 2017. ↩
-
Falcone, R. (2020, July 22). OilRig Targets Middle Eastern Telecommunications Organization and Adds Novel C2 Channel with Steganography to Its Inventory. Retrieved July 28, 2020. ↩
-
US-CERT. (2017, November 01). Malware Analysis Report (MAR) - 10135536-D. Retrieved July 16, 2018. ↩
-
Yagi, J. (2014, August 24). Trojan.Volgmer. Retrieved July 16, 2018. ↩
-
Mandiant. (n.d.). Appendix C (Digital) - The Malware Arsenal. Retrieved July 18, 2016. ↩
-
Yonathan Klijnsma. (2016, May 17). Mofang: A politically motivated information stealing adversary. Retrieved May 12, 2020. ↩
-
Check Point Research Team. (2021, August 14). Indra - Hackers Behind Recent Attacks on Iran. Retrieved February 17, 2022. ↩
-
Microsoft. (2017, September 15). Backdoor:Win32/Truvasys.A!dha. Retrieved November 30, 2017. ↩
-
Cisco Talos. (2021, September 21). TinyTurla - Turla deploys new malware to keep a secret backdoor on victim machines. Retrieved December 2, 2021. ↩
-
Mercer, W. et al. (2020, June 29). PROMETHIUM extends global reach with StrongPity3 APT. Retrieved July 20, 2020. ↩↩
-
Tudorica, R. et al. (2020, June 30). StrongPity APT - Revealing Trojanized Tools, Working Hours and Infrastructure. Retrieved July 20, 2020. ↩↩
-
Chen, J. et al. (2021, February 3). Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. Retrieved April 5, 2021. ↩
-
Singh, S. and Antil, S. (2020, October 27). APT-31 Leverages COVID-19 Vaccine Theme and Abuses Legitimate Online Services. Retrieved March 24, 2021. ↩
-
Cash, D. et al. (2020, December 14). Dark Halo Leverages SolarWinds Compromise to Breach Organizations. Retrieved December 29, 2020. ↩
-
Cherepanov, Anton. (2019, November 10). ESETresearch discovered a trojanized IDA Pro installer. Retrieved March 2, 2022. ↩
-
Rostovcev, N. (2021, June 10). Big airline heist APT41 likely behind a third-party attack on Air India. Retrieved August 26, 2021. ↩
-
CISA, FBI, CNMF. (2020, October 27). https://us-cert.cisa.gov/ncas/alerts/aa20-301a. Retrieved November 4, 2020. ↩
-
CISA. (2020, September 15). Iran-Based Threat Actor Exploits VPN Vulnerabilities. Retrieved December 21, 2020. ↩
-
QiAnXin Threat Intelligence Center. (2019, February 18). APT-C-36: Continuous Attacks Targeting Colombian Government Institutions and Corporations. Retrieved May 5, 2020. ↩
-
Gorelik, M.. (2017, June 9). FIN7 Takes Another Bite at the Restaurant Industry. Retrieved July 13, 2017. ↩
-
Kaspersky Lab’s Global Research and Analysis Team. (2015, February). CARBANAK APT THE GREAT BANK ROBBERY. Retrieved August 23, 2018. ↩
-
Carr, N.. (2017, May 14). Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations. Retrieved June 18, 2017. ↩
-
John, E. and Carvey, H. (2019, May 30). Unraveling the Spiderweb: Timelining ATT&CK Artifacts Used by GRIM SPIDER. Retrieved May 12, 2020. ↩
-
Kimberly Goody, Jeremy Kennelly, Joshua Shilko, Steve Elovitz, Douglas Bienstock. (2020, October 28). Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser. Retrieved October 28, 2020. ↩
-
Malwarebytes Threat Intelligence Team. (2020, June 4). New LNK attack tied to Higaisa APT discovered. Retrieved March 2, 2021. ↩
-
Singh, S. Singh, A. (2020, June 11). The Return on the Higaisa APT. Retrieved March 2, 2021. ↩
-
McKeague, B. et al. (2019, April 5). Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware. Retrieved April 17, 2019. ↩