Skip to content

Hide Navigation Hide TOC

Application Deployment Software - T1017 (327f3cc5-eea1-42d4-a6cd-ed34b7ce8f61)

Adversaries may deploy malicious software to systems within a network using application deployment systems employed by enterprise administrators. The permissions required for this action vary by system configuration; local credentials may be sufficient with direct access to the deployment server, or specific domain credentials may be required. However, the system may require an administrative account to log in or to perform software deployment.

Access to a network-wide or enterprise-wide software deployment system enables an adversary to have remote code execution on all systems that are connected to such a system. The access may be used to laterally move to systems, gather information, or cause a specific effect, such as wiping the hard drives on all endpoints.

Cluster A Galaxy A Cluster B Galaxy B Level
Application Deployment Software - T1017 (327f3cc5-eea1-42d4-a6cd-ed34b7ce8f61) Attack Pattern Software Deployment Tools - T1072 (92a78814-b191-47ca-909c-1ccfe3777414) Attack Pattern 1