heroui logo

Malicious Powershell Executed As A Service

Splunk Security Content

View Source
Summary
This analytic rule is designed to detect the execution of potentially malicious PowerShell commands via the SC.exe utility within Windows environments. By analyzing EventCode 7045 from Windows System logs, the rule filters for specific patterns indicating misuse of PowerShell, such as common invocation parameters and hidden service configurations. Such activities are particularly concerning as they suggest an attacker may be using the Windows Service Control Manager to deploy unauthorized scripts or commands. This could lead to further system compromises, enabling attackers to execute arbitrary code, escalate privileges, or establish persistence on the affected machine.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Windows Registry
  • Image
ATT&CK Techniques
  • T1569
  • T1569.002
Created: 2024-12-10