T1554: Compromise Host Software Binary

Adversaries may modify host software binaries to establish persistent access to systems. Software binaries/executables provide a wide range of system commands or services, programs, and libraries. Common software binaries are SSH clients, FTP clients, email clients, web browsers, and many other user or server applications.

Adversaries may establish persistence though modifications to host software binaries. For example, an adversary may replace or otherwise infect a legitimate application binary (or support files) with a backdoor. Since these binaries may be routinely executed by applications or the user, the adversary can leverage this for persistent access to the host.

An adversary may also modify an existing binary by patching in malicious functionality (e.g., IAT Hooking/Entry point patching) prior to the binary’s legitimate execution. For example, an adversary may modify the entry point of a binary to point to malicious code patched in by the adversary before resuming normal execution flow.

Positive Technologies products that cover the technique

MaxPatrol SIEM knowledge base

unix_mitre_attck_persistence: PT-CR-1665: Unix_Lib_Modify: A system library file was changed unix_mitre_attck_persistence: PT-CR-438: Unix_Bin_Modify: A likely attempt to add malicious code to system files hacking_tools: PT-CR-842: Suspicious_BYOVKD_Driver_Loaded: A driver from the list of vulnerable BYOVKD drivers is loaded

Detection

IDDS0022Data source and componentFile: File DeletionDescription

Monitor for unexpected deletion of client software binaries to establish persistent access to systems.

IDDS0022Data source and componentFile: File ModificationDescription

Monitor changes to client software that do not correlate with known software or patch cycles.

IDDS0022Data source and componentFile: File MetadataDescription

Collect and analyze signing certificate metadata and check signature validity on software that executes within the environment

IDDS0022Data source and componentFile: File CreationDescription

Monitor for newly constructed files that may modify client software binaries to establish persistent access to systems.

Mitigation

IDM1045NameCode SigningDescription

Ensure all application component binaries are signed by the correct application developers.