atomic-threat-coverage/Atomic_Threat_Coverage/Triggers/T1160.md
2019-02-12 04:55:11 +01:00

2.1 KiB
Raw Blame History

T1160 - Launch Daemon

Description from ATT&CK

Per Apples developer documentation, when macOS and OS X boot up, launchd is run to finish system initialization. This process loads the parameters for each launch-on-demand system-level daemon from the property list (plist) files found in /System/Library/LaunchDaemons and /Library/LaunchDaemons (Citation: AppleDocs Launch Agent Daemons). These LaunchDaemons have property list files which point to the executables that will be launched (Citation: Methods of Mac Malware Persistence).

Adversaries may install a new launch daemon that can be configured to execute at startup by using launchd or launchctl to load a plist into the appropriate directories (Citation: OSX Malware Detection). The daemon name may be disguised by using a name from a related operating system or benign software (Citation: WireLurker). Launch Daemons may be created with administrator privileges, but are executed under root privileges, so an adversary may also use a service to escalate privileges from administrator to root.

The plist file permissions must be root:wheel, but the script or program that it points to has no such requirement. So, it is possible for poor configurations to allow an adversary to modify a current Launch Daemons executable and gain persistence or Privilege Escalation.

Atomic Tests


Atomic Test #1 - Launch Daemon

Utilize LaunchDaemon to launch Hello World

Supported Platforms: macOS

Run it with these steps!

  1. Place the following file (com.example.hello) in /System/Library/LaunchDaemons or /Library/LaunchDaemons
Label com.example.hello ProgramArguments hello world KeepAlive