

For example, after dropping a driver file (ex.

Service configurations can be set or modified using system utilities (such as sc.exe), by directly modifying the Registry, or by interacting directly with the Windows API.Īdversaries may also use services to install and execute malicious drivers. Windows service configuration information, including the file path to the service's executable or recovery programs/commands, is stored in the Windows Registry.Īdversaries may install a new service or modify an existing service to execute at startup in order to persist on a system. When Windows boots up, it starts programs or applications called services that perform background system functions.

Adversaries may create or modify Windows services to repeatedly execute malicious payloads as part of persistence.
