ID | E1014 |
Objective(s) | Defense Evasion |
Related ATT&CK Techniques | Rootkit (T1014) |
Version | 3.0 |
Created | 1 August 2019 |
Last Modified | 21 November 2022 |
Behaviors of a rootkit: "A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that is not otherwise allowed and often masks its existence or the existence of other software." [1]
See ATT&CK: Rootkit (T1014).
Rootkits may hide artifacts (kernel modules, services, threads, userspace libraries), prevent actions (API unhooking (prevents API hooks installed by the malware instance from being removed), file access (prevents access to the file system, including specific files and/or directories associated with the malware instance), file deletion (prevents files and/or directories associated with the malware instance from being deleted), memory access (prevents access to system memory where the malware instance stores code or data), native API hooking (prevents other software from hooking native system APIs), registry access (prevents access to the Windows registry, either entire registry or particular registry keys/values), registry deletion (prevents deletion of registry keys and/or values associated with the malware instance).
Name | ID | Description |
---|---|---|
Application Rootkit | E1014.m12 | Application rootkits operate by exchanging standard application files with rootkit files, or changing applications by injecting code or patching. |
Bootloader | E1014.m13 | A bootloader rootkit modifies the bootloader, enabling activation before the operating system is started. Also known as a Bootkit. See ATT&CK: Bootkit. |
Hardware/Firmware Rootkit | E1014.m14 | A firmware rootkit compromises hardware (e.g. network card, hard drive), system BIOS, UEFI firmware. LoJack is the first in-the-wild UEFI rootkit. See ATT&CK: System Firmware. |
Hypervisor/Virtualized Rootkit | E1014.m15 | A hypervisor (virtualized) rootkit hosts the target operating system as a virtual machine, enabling interception of all hardware calls. Also called, virtual-machine-based rootkit (VMBR). |
Kernel Mode Rootkit | E1014.m16 | Rootkit operates by adding or replacing code in OS, device drivers, loadable kernel modules (LKM). Related to ATT&CK: Kernel Modules and Extensions |
Memory Rootkit | E1014.m17 | A memory rootkit hids in RAM. Behaviors may include methods to prevent memory access. The lifespan of a memory rootkit is short because it disappears after a system reboot. |
Name | Date | Method | Description |
---|---|---|---|
Hupigon | 2013 | -- | Certain variants of the malware may have rootkit functionality [3] |
Stuxnet | 2010 | E1014.m17 | Stuxnet registers custom resource drives signed with a legitimate Realtek digital certificate [4] |
[1] https://en.wikipedia.org/wiki/Rootkit
[2] https://www.cyber.nj.gov/threat-profiles/trojan-variants/poison-ivy
[3] https://www.f-secure.com/v-descs/backdoor_w32_hupigon.shtml
[4] https://docs.broadcom.com/doc/security-response-w32-stuxnet-dossier-11-en