Class: Trojan
A malicious program designed to electronically spy on the user’s activities (intercept keyboard input, take screenshots, capture a list of active applications, etc.). The collected information is sent to the cybercriminal by various means, including email, FTP, and HTTP (by sending data in a request).Read more
Platform: Win32
Win32 is an API on Windows NT-based operating systems (Windows XP, Windows 7, etc.) that supports execution of 32-bit applications. One of the most widespread programming platforms in the world.Family: Trojan.Win64.Agent
No family descriptionExamples
F2B705A5A3B036E1C2DADA594F30FF1D2E2FD171414665D243F4DE38BD6D39E0
6376D886B6EF2799235A8F39ED7432B5
D7A54F90BAC43CDDEB863EF520F641FF
5089C4E58694E0A8F955DAB7FB86B832
Tactics and Techniques: Mitre*
Adversaries may abuse the Windows service control manager to execute malicious commands or payloads. The Windows service control manager (services.exe
) is an interface to manage and manipulate services. The service control manager is accessible to users via GUI components as well as system utilities such as sc.exe
and Net.
Adversaries may abuse the Windows service control manager to execute malicious commands or payloads. The Windows service control manager (services.exe
) is an interface to manage and manipulate services. The service control manager is accessible to users via GUI components as well as system utilities such as sc.exe
and Net.
* © 2025 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.