Description
The Windows Service Manager feature in malware allows attackers to interact with and manipulate Windows services running on the compromised system. This feature provides the capability to list, start, stop, or even modify services, giving attackers a powerful tool to influence system behavior and configurations. Beyond these manipulations, the feature can also be employed to cause disruptions, either by disabling essential services or by triggering services that consume excessive system resources, thereby affecting system performance and stability. One of the most potent uses of this feature is in privilege escalation; by tampering with or replacing certain services that run with elevated permissions, attackers can potentially gain higher-level access to the system.
| Categories | Privilege Escalation, Assistance, Disruption |
| Dangerousness | Medium |
Existing Techniques
| Name | Associated Feature(s) | Has Snippet | Matching Sample |
|---|---|---|---|
Windows Service Information Gathering
|
Services Manager | 0 | |
Windows Services Enumeration
|
Services Manager | 0 |
Windows Service Information Gathering
Windows Services Enumeration
Beast 2.06
ProRat 1.8
Optix Pro 1.33
Beast 2.07
Institution 2004 0.4.0
CIA 1.3
ProRat 1.9
DARKMOON 4.11 / 4.11 Private Edition
TrojNa$ 1.0
Turkojan 3.0
Poison Ivy 2.3.0
sharK 2.4.0 Fwb+
Poison Ivy 2.3.2
Turkojan 4
Turkojan 4.0
sharK 3.1 fwb++
SynRAT 2.1
SynRAT 4.0.1
Cerberus 1.0 Beta
Cerberus 1.01 Beta
Cerberus 1.02 Beta
SynRAT 4.3.1-A-1
Apocalypse RAT 1.4
Cerberus 1.03.4
Spy-Net 2.6
Cerberus 1.03.5 Beta
DarkComet RAT 2.0 RC4
CyberGate 1.04.8
Lost Door 4.3.1
DarkComet RAT 2.0 RC7
Schwarze Sonne 1.0
Coolvibes 1 Update 8
Xtreme RAT 2.9
DarkComet RAT 5.3
DarkComet RAT 5.3.1
NjRat 0.7d