Skip to content

Latest commit

 

History

History
65 lines (49 loc) · 3.71 KB

rootkit.md

File metadata and controls

65 lines (49 loc) · 3.71 KB
ID E1014
Objective(s) Defense Evasion
Related ATT&CK Techniques Rootkit (T1014)
Version 3.0
Created 1 August 2019
Last Modified 21 November 2022

Rootkit

Behaviors of a rootkit: "A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that is not otherwise allowed and often masks its existence or the existence of other software." [1]

See ATT&CK: Rootkit (T1014).

Rootkits may hide artifacts (kernel modules, services, threads, userspace libraries), prevent actions (API unhooking (prevents API hooks installed by the malware instance from being removed), file access (prevents access to the file system, including specific files and/or directories associated with the malware instance), file deletion (prevents files and/or directories associated with the malware instance from being deleted), memory access (prevents access to system memory where the malware instance stores code or data), native API hooking (prevents other software from hooking native system APIs), registry access (prevents access to the Windows registry, either entire registry or particular registry keys/values), registry deletion (prevents deletion of registry keys and/or values associated with the malware instance).

Methods

Name ID Description
Application Rootkit E1014.m12 Application rootkits operate by exchanging standard application files with rootkit files, or changing applications by injecting code or patching.
Bootloader E1014.m13 A bootloader rootkit modifies the bootloader, enabling activation before the operating system is started. Also known as a Bootkit. See ATT&CK: Bootkit.
Hardware/Firmware Rootkit E1014.m14 A firmware rootkit compromises hardware (e.g. network card, hard drive), system BIOS, UEFI firmware. LoJack is the first in-the-wild UEFI rootkit. See ATT&CK: System Firmware.
Hypervisor/Virtualized Rootkit E1014.m15 A hypervisor (virtualized) rootkit hosts the target operating system as a virtual machine, enabling interception of all hardware calls. Also called, virtual-machine-based rootkit (VMBR).
Kernel Mode Rootkit E1014.m16 Rootkit operates by adding or replacing code in OS, device drivers, loadable kernel modules (LKM). Related to ATT&CK: Kernel Modules and Extensions
Memory Rootkit E1014.m17 A memory rootkit hids in RAM. Behaviors may include methods to prevent memory access. The lifespan of a memory rootkit is short because it disappears after a system reboot.

Use in Malware

Name Date Method Description
Hupigon 2013 -- Certain variants of the malware may have rootkit functionality [3]
Stuxnet 2010 E1014.m17 Stuxnet registers custom resource drives signed with a legitimate Realtek digital certificate [4]

References

[1] https://en.wikipedia.org/wiki/Rootkit

[2] https://www.cyber.nj.gov/threat-profiles/trojan-variants/poison-ivy

[3] https://www.f-secure.com/v-descs/backdoor_w32_hupigon.shtml

[4] https://docs.broadcom.com/doc/security-response-w32-stuxnet-dossier-11-en