persistence-info.github.io

View on GitHub

Windows Services

Location:

HKLM\SYSTEM\CurrentControlSet\Services

Classification:

Criteria Value
Permissions Admin
Security context System
Persistence type Registry
Code type EXE, DLL, Other
Launch type Automatic
Impact Non-destructive
OS Version All OS versions
Dependencies OS only
Toolset Scriptable1

Description:

Windows Services are one of the best known and widely used persistence mechanisms. EXE-based approach is best known, but DLLs loaded by svchost.exe are used (also by malicious actors) as well.
Oficially, the DLL must be indicated within the Parameters subkey, but in practice it is not required, making the detection a bit harder.2

References:

Credits:

See also:

Remarks: