Skip to main content
T1543Persistencemedium difficulty

Create or Modify System Process

Create or Modify System Process (T1543) is a MITRE ATT&CK technique in the Persistence tactic. SOC analysts detect it by monitoring for XDR, SIEM events, behavioral anomalies, and the specific indicators described in this detection guide. Practice detection in SOCSimulator Operations.

XDRSIEM

What is Create or Modify System Process?

Adversaries may create or modify system-level processes to repeatedly execute malicious payloads as part of persistence. When operating systems boot up, they can start processes that perform background system functions. On Windows and Linux, these system processes are referred to as services. Adversaries may install a new service or modify an existing service to execute at startup in order to persist on a system. Service configurations are stored in the registry for Windows and in /etc/systemd for modern Linux systems. Creating or modifying system processes provides privileged, persistent execution that is difficult for standard users to remove. On macOS, launch agents and launch daemons serve similar purposes. The challenge in detecting malicious system process creation is distinguishing it from the large volume of legitimate service installations and modifications that occur during normal software lifecycle management in enterprise environments.

Create or Modify System Process is documented as technique T1543 in the MITRE ATT&CK knowledge base under the Persistence tactic. Detection requires visibility into XDR, SIEM telemetry.

Detection Strategies

The following detection strategies help SOC analysts identify Create or Modify System Process activity. These methods apply across XDR, SIEM environments and can be implemented as detection rules, correlation queries, or behavioral analytics in your security platform.

  1. 1

    Monitor Windows Registry paths HKLM\SYSTEM\CurrentControlSet\Services for new service entries and compare against authorized software inventory, alerting on services with executable paths in user-writable locations or temp directories.

  2. 2

    Track changes to systemd unit files in /etc/systemd/system/ and /lib/systemd/system/ on Linux systems using file integrity monitoring, alerting on new or modified unit files that execute scripts from non-standard paths.

  3. 3

    Detect service creation using unrecognized or unsigned service binaries by correlating service executable paths with known good software inventory and digital signature validation databases.

  4. 4

    Monitor for services configured with unusual recovery options such as restarting with different executables on failure, which can be used to establish redundant execution mechanisms that survive if the primary service is stopped.

  5. 5

    Alert on service creation or modification events occurring outside of authorized change management windows, particularly on production systems where service changes should follow a controlled deployment process.

Example Alerts

These realistic alert examples show what Create or Modify System Process looks like in your security tools. Use them to tune detection rules and train analysts to recognize true positives versus false positives in live environments.

HighXDR

New System Service Installed with Suspicious Binary

New Windows service registered with binary path C:\Windows\Temp\sysmonitor64.exe. The executable is not digitally signed, was created 2 minutes before service registration, and its hash matches a known remote access trojan variant. The service description reads "Windows System Monitor Service" mimicking legitimate monitoring tools. The service is configured to start automatically as LocalSystem.

CriticalSIEM

Systemd Unit File Created for Reverse Shell Persistence

File integrity monitoring detected creation of /etc/systemd/system/network-monitor.service on production Linux server. The unit file executes a bash script from /var/tmp/.sysmon that establishes a reverse shell connection to an external IP address. The service is configured to restart automatically and starts at boot, providing persistent backdoor access that survives reboots and most incident response actions that do not include full OS reinstallation.

HighXDR

macOS Launch Daemon Created for Persistence

New launch daemon plist file created at /Library/LaunchDaemons/com.apple.system.health.plist on macOS developer workstation. The plist references an executable in /Library/Application Support/.hidden/ that is not associated with any installed application. The daemon is configured to run at boot as root and the executable communicates with a domain that was registered 10 days ago, consistent with attacker-controlled infrastructure.

Practice Detecting Create or Modify System Process

SOCSimulator provides hands-on training rooms where you investigate real-world attack scenarios including Create or Modify System Process. Build detection skills with zero consequences — free forever.

12,000+ analysts trained
No credit card required

Frequently Asked Questions

How do SOC analysts detect Create or Modify System Process?
SOC analysts detect Create or Modify System Process (T1543) by monitoring XDR, SIEM telemetry for behavioral anomalies and specific indicators. Key detection methods include monitor windows registry paths hklm\system\currentcontrolset\services for new service entries and compare against authorized software inventory, alert. SOCSimulator provides hands-on practice detecting this technique with realistic alerts.
What security tools are used to detect Create or Modify System Process?
Create or Modify System Process can be detected using XDR, SIEM platforms. XDR tools are particularly effective for this technique because they provide visibility into the persistence phase of the attack chain. SOCSimulator simulates all three tool types for hands-on training.
How common is Create or Modify System Process in real-world attacks?
Create or Modify System Process is a well-documented MITRE ATT&CK technique in the Persistence tactic. It appears in threat intelligence reports from multiple security vendors and has been observed in campaigns by various threat actor groups. SOCSimulator includes realistic Create or Modify System Process scenarios based on documented attack patterns, helping analysts build detection intuition.
Can I practice detecting Create or Modify System Process for free?
Yes. SOCSimulator offers free forever access to training scenarios, including Persistence techniques like Create or Modify System Process. You can investigate realistic alerts in guided Operations rooms, build detection skills with SIEM, XDR, and Firewall interfaces, and test yourself under pressure in Shift Mode. No credit card required.
Glossary

What is Persistence? — SOC Glossary

Persistence refers to techniques adversaries use to maintain access across reboots, credential changes, and other disrup…

Read more
Glossary

What is EDR? — SOC Glossary

Endpoint Detection and Response (EDR) is a security technology that continuously monitors endpoint activity, recording p…

Read more
Glossary

What is Threat Hunting? — SOC Glossary

Threat hunting is the proactive, human-led process of searching through security telemetry to find hidden threats that e…

Read more
Glossary

What is IOC? — SOC Glossary

An Indicator of Compromise (IOC) is an observable artifact, such as a file hash, IP address, domain name, URL, registry …

Read more
Career Path

Threat Hunter Career Guide — Salary & Skills

Threat Hunters do not wait for alerts. You develop hypotheses based on threat intelligence and adversary behavior models…

Read more
Career Path

Detection Engineer Career Guide — Salary & Skills

Detection Engineers build the rules, analytics, and automated workflows that determine what the SOC can see. You transla…

Read more
Tool

XDR Training Console — SOCSimulator

The XDR console in SOCSimulator replicates the investigation workflow of platforms like CrowdStrike Falcon, Microsoft De…

Read more
Tool

SIEM Training Console — SOCSimulator

The SIEM console in SOCSimulator replicates the workflow of enterprise platforms like Splunk Enterprise Security, Micros…

Read more
Comparison

SOCSimulator Vs. Letsdefend — Platform Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator Vs. Tryhackme — Platform Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more
Glossary

SOC Glossary — Security Operations Terminology

Complete glossary of Security Operations Center terminology for aspiring SOC analysts.

Read more
Feature

Shift Mode — Real-Time SOC Simulation

Practice alert triage under realistic time pressure with SLA timers and noise injection.

Read more

We use cookies to improve your experience and measure usage. Learn more