[vc_row][vc_column][vc_wp_text]

[xyz-ips snippet=”metadatatitle”]

[/vc_wp_text][vc_empty_space][/vc_column][/vc_row][vc_row][vc_column width=”2/3″][vc_raw_html]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[/vc_raw_html][/vc_column][vc_column width=”1/3″][vc_wp_text][xyz-ips snippet=”metadatatime”][/vc_wp_text][/vc_column][/vc_row][vc_row][vc_column width=”2/3″][vc_empty_space][vc_column_text]

The Windows operating system contains a lot of system processes that are present every time we boot our machines. These processes are responsible for a lot of things. From initialization and creating the user interface to loading the necessary drivers and DLL’s.

It becomes a must for threat hunters to know what is the normal behavior of these processes. Such as the parent child relationship between them and the number of instances that should be present on a machine or user instance.

Today we’ll discuss these processes and provide an overview that’ll help every threat hunter in his journey (hopefully).

Let’s get started.

System Idle Process

The system idle process (which is not an actual process) is the one responsible for accounting for IDLE time on the system.

[/vc_column_text][vc_empty_space][vc_raw_html]JTNDcHJlJTNFJTBBUElEJTNBMCUwQVBhcmVudCUyMFByb2Nlc3MlM0ElMjBOb25lJTBBQ2hpbGQlMjBQcm9jZXNzZXMlM0ElMjAlMEFOb25lVXNlciUzQSUyME5UJTIwQVVUSE9SSVRZJTVDU1lTVEVNJTIwJTI4Uy0xLTUtMTglMjklMEFJbWFnZSUzQSUyME5vbmUlMEFOJUMyJUIwJTIwT2YlMjBJbnN0YW5jZXMlM0ElMjAxJTBBJTNDJTJGcHJlJTNF[/vc_raw_html][vc_empty_space][vc_column_text]

System

The system “process” is a special kind of process that hosts threads that only run in kernel mode.

[/vc_column_text][vc_empty_space][vc_raw_html]JTNDcHJlJTNFJTBBUElEJTNBJTIwNFBhcmVudCUyMCUwQVByb2Nlc3MlM0ElMjBOb25lJTBBQ2hpbGQlMjBQcm9jZXNzZXMlM0ElMjBOb25lJTBBVXNlciUzQSUyME5UJTIwQVVUSE9SSVRZJTVDU1lTVEVNJTIwJTI4Uy0xLTUtMTglMjklMEFJbWFnZSUzQSUyMCUyNVN5c3RlbXJvb3QlMjUlNUNTeXN0ZW0zMiU1Q250b3Nrcm5sLmV4ZSUyMCUyOFRhc2slMjBNYW5hZ2VyJTIwJTJGJTIwUHJvY2VzcyUyMEhhY2tlciUyOSUyMGFuZCUyME5vbmUlMjAlMjhQcm9jZXNzJTIwRXhwbG9yZXIlMjklMEFOJUMyJUIwJTIwT2YlMjBJbnN0YW5jZXMlM0ElMjAxJTBBJTNDJTJGcHJlJTNF[/vc_raw_html][vc_empty_space][vc_column_text]

Memory Compression

It’s a minimal process that is responsible for compressing memory of processes in RAM instead of paging it out to disk to improve performance and response time.

[/vc_column_text][vc_empty_space][vc_raw_html]JTNDcHJlJTNFJTBBUElEJTNBJTIwUmFuZG9tJTBBUGFyZW50JTIwUHJvY2VzcyUzQSUyMFN5c3RlbSUwQUNoaWxkJTIwUHJvY2Vzc2VzJTNBJTIwTm9uZSUwQVVzZXIlM0ElMjBOVCUyMEFVVEhPUklUWSU1Q1NZU1RFTSUyMCUyOFMtMS01LTE4JTI5JTBBSW1hZ2UlM0ElMjBOb25lJTBBTiVDMiVCMCUyME9mJTIwSW5zdGFuY2VzJTNBJTIwMSUwQSUzQyUyRnByZSUzRQ==[/vc_raw_html][vc_empty_space][vc_column_text]

Registry

Similar to the memory compression “Process” (Again, not really a process by windows standard). The registry process was introduced to improve performance and reduce memory usage. It stores registry hive data such as HKLM and HKCU.

[/vc_column_text][vc_empty_space][vc_raw_html]JTNDcHJlJTNFJTBBUElEJTNBJTIwUmFuZG9tJTBBUGFyZW50JTIwUHJvY2VzcyUzQSUyME5vbmUlMEFDaGlsZCUyMFByb2Nlc3NlcyUzQSUyME5vbmUlMEFVc2VyJTNBJTIwTlQlMjBBVVRIT1JJVFklNUNTWVNURU0lMjAlMjhTLTEtNS0xOCUyOSUwQUltYWdlJTNBJTIwTm9uZSUwQU4lQzIlQjAlMjBPZiUyMEluc3RhbmNlcyUzQSUyMDElMEElM0MlMkZwcmUlM0U=[/vc_raw_html][vc_empty_space][vc_column_text]

Session Manager Subsystem (SMSS.EXE)

The sessions manager process is the first user mode process. It’s responsible for creating the list of the environment variables, the security descriptors that’ll be used by the various system resources, initializing the rest of the registry (HKLM Software and the SAM and security hives) and a lot more. Refer to Windows Internals 7th edition book for a complete list.

The system process creates the first SMSS instance and its known as the master SMSS.EXE process. It’s the only instance of SMSS.EXE that’ll stay after windows has booted up and one of the characteristics of this process is that it doesn’t have any command line arguments

The master SMSS process will create at least two instances of itself. One in “Session 0” (OS) that will be responsible for creating the “wininit.exe” process and another in “Session 1” (User) that’ll represent the first logged-on user and will create the “winlogon.exe”. Both will spawn a “csrss.exe” process.

All the children SMSS.EXE processes created by the master SMSS.EXE process will exit after finishing their JOB.

[/vc_column_text][vc_empty_space][vc_raw_html]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[/vc_raw_html][vc_empty_space][vc_column_text]

Windows Subsystem Process (CSRSS.EXE)

[/vc_column_text][vc_empty_space][vc_raw_html]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[/vc_raw_html][vc_empty_space][vc_column_text]

Windows Initialization Process (WININIT.EXE)

The windows initialization process is responsible for initializing and setting a lot of things.

  • It sets the default environment variables (USERPROFILE, ALLUSERPROFILE, PUBLIC and ProgramData).
  • It creates the LSASS process and sets the LSA encryption key.
  • It creates the Services Control manager by launching the SERVICES.EXE process
  • It creates the temp directory in the system root (%Systemroot%\Temp).
  • …Etc.

[/vc_column_text][vc_empty_space][vc_raw_html]JTNDcHJlJTNFJTBBUElEJTNBJTIwUmFuZG9tJTBBUGFyZW50JTIwUHJvY2VzcyUzQSUyME9ycGhhbiUyMHByb2Nlc3MlMjAlMjhQYXJlbnQlMjB3YXMlMjB0aGUlMjBzZXNzaW9ucyUyMDAlMjBTTVNTLkVYRSUyMGR1cmluZyUyMGJvb3QlMjklMEFDaGlsZCUyMFByb2Nlc3NlcyUzQSUyMCVFMiU4MCU5Q3NlcnZpY2VzLmV4ZSVFMiU4MCU5RCUyQyUyMCVFMiU4MCU5Q2xzYXNzLmV4ZSVFMiU4MCU5RCUyQyUyMCVFMiU4MCU5Q2ZvbnRkcnZob3N0LmV4ZSVFMiU4MCU5RCUwQVVzZXIlM0ElMjBOVCUyMEFVVEhPUklUWSU1Q1NZU1RFTSUyMCUyOFMtMS01LTE4JTI5SW1hZ2UlM0ElMjAlMjVTeXN0ZW1yb290JTI1JTVDU3lzdGVtMzIlNUN3aW5pbml0LmV4ZSUwQU4lQzIlQjAlMjBPZiUyMEluc3RhbmNlcyUzQSUyMDElMEElM0MlMkZwcmUlM0U=[/vc_raw_html][vc_empty_space][vc_column_text]

Service Control Manager (SERVICES.EXE)

The SCM or service control manager is the responsible for handling (Start, Stop…etc.) services defined in the system. Services are defined in the following registry key: .

You can read my blog post on “Demystifying the “SVCHOST.EXE” Process and Its Command Line Options” for more details on the SCM.

[/vc_column_text][vc_empty_space][vc_raw_html]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[/vc_raw_html][vc_empty_space][vc_column_text]

Windows Logon Process (WINLOGON.EXE)

Handles everything related to user’s logons / logoffs and user initialization. When logon is successful and validated by the LSASS process. It launches the processes listed in the “Userinit” registry value located at

[/vc_column_text][vc_empty_space][vc_raw_html]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[/vc_raw_html][vc_empty_space][vc_column_text]

LOGONUI.EXE

Launched by “winlogon.exe” to show the logon interface and initialize the credential providers (Username/Password, Windows Hello…etc.).

[/vc_column_text][vc_empty_space][vc_raw_html]JTNDcHJlJTNFJTBBUElEJTNBJTIwUmFuZG9tJTBBUGFyZW50JTIwUHJvY2VzcyUzQSUyMCVFMiU4MCU5Q3dpbmxvZ29uLmV4ZSVFMiU4MCU5RCUwQUNoaWxkJTIwUHJvY2Vzc2VzJTNBJTIwTm9uZSUwQVVzZXIlM0ElMjBOVCUyMEFVVEhPUklUWSU1Q1NZU1RFTSUyMCUyOFMtMS01LTE4JTI5JTBBSW1hZ2UlM0ElMjAlMjVTeXN0ZW1Sb290JTI1JTVDc3lzdGVtMzIlNUNMb2dvblVJLmV4ZSUwQU4lQzIlQjAlMjBPZiUyMEluc3RhbmNlcyUzQSUyME9uZSUyMGZvciUyMGVhY2glMjBjb25uZWN0ZWQlMjAlMkYlMjBsb2dnZWQlMjBvbiUyMHVzZXIlMjB3aXRoJTIwYSUyMGxvY2tlZCUyMHNjcmVlbi4lMEElM0MlMkZwcmUlM0U=[/vc_raw_html][vc_empty_space][vc_column_text]

USERINIT.EXE

As the name suggest the is responsible for user initialization, launching the logon scripts, reestablishing network connections and launching the windows shell.

The value of the shell (By default is ) is read from the following registry key

The value for logon script named is also read from the same key.

[/vc_column_text][vc_empty_space][vc_raw_html]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[/vc_raw_html][vc_empty_space][vc_column_text]

EXPLORER.EXE

[/vc_column_text][vc_empty_space][vc_raw_html]JTNDcHJlJTNFJTBBUElEJTNBJTIwcmFuZG9tJTBBUGFyZW50JTIwUHJvY2VzcyUzQSUyME9ycGhhbiUyMHByb2Nlc3MlMjAlMjhQYXJlbnQlMjB3YXMlMjB0aGUlMjAlRTIlODAlOUN1c2VyaW5pdC5leGUlRTIlODAlOUQlMjBwcm9jZXNzJTI5JTBBQ2hpbGQlMjBQcm9jZXNzZXMlM0ElMjBNdWx0aXBsZSUyMHByb2Nlc3NlcyUwQVVzZXIlM0ElMjBMb2dnZWQlMjBvbiUyMHVzZXJJbWFnZSUzQSUyMCUyNVN5c3RlbXJvb3QlMjUlNUNzeXN0ZW0zMiU1Q2V4cGxvcmVyLmV4ZSUwQU4lQzIlQjAlMjBPZiUyMGluc3RhbmNlcyUzQSUyMDElMjBmb3IlMjBlYWNoJTIwdXNlciUyMGNvbm5lY3RlZCUyMG9uJTIwdGhlJTIwbWFjaGluZS4lMEElM0MlMkZwcmUlM0U=[/vc_raw_html][vc_empty_space][vc_column_text]

Desktop Window Manager (DWM.EXE)

The process responsible for rendering stuff on the screen.

[/vc_column_text][vc_empty_space][vc_raw_html]JTNDcHJlJTNFJTBBUElEJTNBJTIwUmFuZG9tJTBBUGFyZW50JTIwUHJvY2VzcyUzQSUyMCVFMiU4MCU5Q3dpbmxvZ29uLmV4ZSVFMiU4MCU5RCUwQUNoaWxkJTIwUHJvY2Vzc2VzJTNBJTIwTm9uZSUwQVVzZXIlM0ElMjBXaW5kb3clMjBNYW5hZ2VyJTVDRFdNLVglMjAlMjhXaGVyZSUyMCVFMiU4MCU5Q1glRTIlODAlOUQlMjBpcyUyMHRoZSUyMG51bWJlciUyMG9mJTIwdGhlJTIwc2Vzc2lvbiUyMG9mJTIwdGhlJTIwVVNFUiUyOSUwQUltYWdlJTNBJTIwJTI1U3lzdGVtcm9vdCUyNSU1Q1N5c3RlbTMyJTVDZHdtLmV4ZSUwQU4lQzIlQjAlMjBPZiUyMEluc3RhbmNlcyUzQSUyMDElMjBwZXIlMjBsb2dnZWQlMjBvbiUyMHVzZXIlMEElM0MlMkZwcmUlM0U=[/vc_raw_html][vc_empty_space][vc_column_text]

Local Security Authentication Service (LSASS.EXE)

Process responsible for managing authentication on the machine.

[/vc_column_text][vc_empty_space][vc_raw_html]JTNDcHJlJTNFJTBBUElEJTNBJTIwUmFuZG9tJTBBUGFyZW50JTIwUHJvY2VzcyUzQSUyMCVFMiU4MCU5Q3dpbmluaXQuZXhlJUUyJTgwJTlEJTBBQ2hpbGQlMjBQcm9jZXNzZXMlM0ElMjBOb25lJTIwJTI4RXhjbHVkaW5nJTIwcGFzc3dvcmQlMjBmaWx0ZXJzJTI5JTBBVXNlciUzQSUyME5UJTIwQVVUSE9SSVRZJTVDU1lTVEVNJTIwJTI4Uy0xLTUtMTglMjklMEFJbWFnZSUzQSUyMCUyNVN5c3RlbXJvb3QlMjUlNUNzeXN0ZW0zMiU1Q2xzYXNzLmV4ZSUwQU4lQzIlQjAlMjBPZiUyMEluc3RhbmNlcyUzQSUyMDElMEElM0MlMkZwcmUlM0U=[/vc_raw_html][vc_empty_space][vc_column_text]

Service Host Process (SVCHOST.EXE)

The process responsible for hosting DLL services. Read my blog to get more insight.

One thing to note is that the “svchost.exe” process should never exist without the “-k” flag at a minimum.

[/vc_column_text][vc_empty_space][vc_raw_html]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[/vc_raw_html][vc_empty_space][vc_column_text]

Note: Most of the processes in windows can spawn the process. Which is a process designed to handle crashes and errors. Something to keep in mind when looking at child processes.

[/vc_column_text][vc_column_text]

Conclusion

Thanks for reading. I hope you enjoyed this overview of system processes. I’ll be adding more processes over time.

You can download the Mind Map below from my GitHub to help visualize all of this.

[/vc_column_text][/vc_column][vc_column width=”1/3″][/vc_column][/vc_row][vc_row][vc_column width=”2/3″][vc_separator style=”shadow”][vc_column_text]Source: https://nasbench.medium.com/[/vc_column_text][/vc_column][vc_column width=”1/3″][/vc_column][/vc_row]

Pin It on Pinterest