Dark Mode

Settings

Capec-30 Detail

Hijacking a Privileged Thread of Execution

Standard Software Likelihood: Low Typical Severity: Very High

Parents: 233

Threats: T73 T263 T281 T293 T307 T338 T387 T400

Description

An adversary hijacks a privileged thread of execution by injecting malicious code into a running process. By using a privleged thread to do their bidding, adversaries can evade process-based detection that would stop an attack that creates a new process. This can lead to an adversary gaining access to the process's memory and can also enable elevated privileges. The most common way to perform this attack is by suspending an existing thread and manipulating its memory.

Not present

External ID Source Link Description
CAPEC-30 capec https://capec.mitre.org/data/definitions/30.html
CWE-270 cwe http://cwe.mitre.org/data/definitions/270.html
T1055.003 ATTACK https://attack.mitre.org/wiki/Technique/T1055/003 Process Injection: Thread Execution Hijacking
Explore
  1. Determine target thread: The adversary determines the underlying system thread that is subject to user-control

Experiment
  1. Gain handle to thread: The adversary then gains a handle to a process thread.

  2. Techniques
    Use the "OpenThread" API call in Windows on a known thread.
    Cause an exception in a java privileged block public function and catch it, or catch a normal signal. The thread is then hanging and the adversary can attempt to gain a handle to it.
  3. Alter process memory: Once the adversary has a handle to the target thread, they will suspend the thread and alter the memory using native OS calls.

  4. Techniques
    On Windows, use "SuspendThread" followed by "VirtualAllocEx", "WriteProcessMemory", and "SetThreadContext".
Exploit
  1. Resume thread execution: Once the process memory has been altered to execute malicious code, the thread is then resumed.

  2. Techniques
    On Windows, use "ResumeThread".
  1. The application in question employs a threaded model of execution with the threads operating at, or having the ability to switch to, a higher privilege level than normal users
  2. In order to feasibly execute this class of attacks, the adversary must have the ability to hijack a privileged thread. This ability includes, but is not limited to, modifying environment variables that affect the process the thread belongs to, or calling native OS calls that can suspend and alter process memory. This does not preclude network-based attacks, but makes them conceptually more difficult to identify and execute.
  1. None: No specialized resources are required to execute this type of attack. The adversary needs to be able to latch onto a privileged thread. The adversary does, however, need to be able to program, compile, and link to the victim binaries being executed so that it will turn control of a privileged thread over to the adversary's malicious code. This is the case even if the adversary conducts the attack remotely.
High
Hijacking a thread involves knowledge of how processes and threads function on the target platform, the design of the target application as well as the ability to identify the primitives to be used or manipulated to hijack the thread.
Integrity Availability Authorization Access Control Confidentiality
Execute Unauthorized Commands (Run Arbitrary Code) Execute Unauthorized Commands (Run Arbitrary Code) Gain Privileges Gain Privileges Gain Privileges
Execute Unauthorized Commands (Run Arbitrary Code)
  1. Adversary targets an application written using Java's AWT, with the 1.2.2 era event model. In this circumstance, any AWTEvent originating in the underlying OS (such as a mouse click) would return a privileged thread (e.g., a system call). The adversary could choose to not return the AWT-generated thread upon consuming the event, but instead leveraging its privilege to conduct privileged operations.