Skip to content

Latest commit

 

History

History
79 lines (59 loc) · 5.03 KB

rootkit.md

File metadata and controls

79 lines (59 loc) · 5.03 KB
ID E1014
Objective(s) Defense Evasion
Related ATT&CK Techniques Rootkit (T1014)
Version 3.2
Created 1 August 2019
Last Modified 28 April 2024

Rootkit

Behaviors of a rootkit: "A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that is not otherwise allowed and often masks its existence or the existence of other software." [1]

See ATT&CK: Rootkit (T1014).

Rootkits may hide artifacts (kernel modules, services, threads, userspace libraries), prevent actions, API unhooking (prevents API hooks installed by the malware instance from being removed), file access (prevents access to the file system, including specific files and/or directories associated with the malware instance), file deletion (prevents files and/or directories associated with the malware instance from being deleted), memory access (prevents access to system memory where the malware instance stores code or data), native API hooking (prevents other software from hooking native system APIs), registry access (prevents access to the Windows registry, either entire registry or particular registry keys/values), and registry deletion (prevents deletion of registry keys and/or values associated with the malware instance).

Methods

Name ID Description
Application Rootkit E1014.m12 Application rootkits operate by exchanging standard application files with rootkit files, or changing applications by injecting code or patching.
Bootloader E1014.m13 A bootloader rootkit modifies the bootloader, enabling activation before the operating system is started, also known as a Bootkit. See ATT&CK: Bootkit.
Hardware/Firmware Rootkit E1014.m14 A firmware rootkit compromises hardware (e.g. network card, hard drive), system BIOS, UEFI firmware. LoJack is the first in-the-wild UEFI rootkit. See ATT&CK: System Firmware.
Hypervisor/Virtualized Rootkit E1014.m15 A hypervisor (virtualized) rootkit hosts the target operating system as a virtual machine, enabling interception of all hardware calls, also called a virtual-machine-based rootkit (VMBR).
Kernel Mode Rootkit E1014.m16 Rootkit operates by adding or replacing code in OS, device drivers, loadable kernel modules (LKM). Related to ATT&CK: Kernel Modules and Extensions
Memory Rootkit E1014.m17 A memory rootkit hids in RAM. Behaviors may include methods to prevent memory access. The lifespan of a memory rootkit is short because it disappears after a system reboot.

Use in Malware

Name Date Method Description
Hupigon 2013 -- Hupigon has certain variants that may have rootkit functionality. [3]
Stuxnet 2010 E1014.m16 Stuxnet registers custom resource drives signed with a legitimate Realtek digital certificate. [4]

Detection

Rootkits can be detected by detecting primary rootkit behaviors: Hide Artifacts, Impair Defenses, and Highjack Execution Flow. Hidden artifacts include kernel modules (hides use of kernel modules used by the malware instance), services (hides any system services that the malware instance creates or injects itself into), threads (hides one or more threads that belong to the malware instance), and userspace libraries (hides use of userspace libraries used by the malware instance).

Rootkits can also be detected via memory dump analysis or virtual machine introspection.

Tool: CAPE Mapping APIs
spicyhotpot_behavior Rootkit (E1014) --
accesses_primary_patition Rootkit (E1014) --
direct_hdd_access Rootkit (E1014) --
enumerates_physical_drives Rootkit (E1014) --
physical_drive_access Rootkit (E1014) --

References

[1] https://en.wikipedia.org/wiki/Rootkit

[2] https://www.cyber.nj.gov/threat-center/threat-profiles/trojan-variants/poison-ivy

[3] https://www.f-secure.com/v-descs/backdoor_w32_hupigon.shtml

[4] https://docs.broadcom.com/doc/security-response-w32-stuxnet-dossier-11-en