Esc
Executable Installer File Permissions Weakness - T1574.005
(ATT&CK® Technique)
Definition
Adversaries may execute their own malicious payloads by hijacking the binaries used by an installer. These processes may automatically execute specific binaries as part of their functionality or to perform other actions. If the permissions on the file system directory containing a target binary, or permissions on the binary itself, are improperly set, then the target binary may be overwritten with another binary using user-level permissions and executed by the original process. If the original process and thread are running under a higher permissions level, then the replaced binary will also execute under higher-level permissions, which could include SYSTEM.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.