
Summary
This detection rule identifies potentially malicious activity by monitoring service binaries that are executed from suspicious directories in the Windows environment. It targets paths that are commonly associated with system-wide installations, public access, or temporary storage locations. The rule specifies mandatory service parent processes, namely `services.exe` and `svchost.exe`, as filters to focus only on legitimate service processes. If a service binary is launched from any of these anomalous directories—such as `C:\Users\Public\`, `C:\$Recycle.bin\`, or `C:\Windows\IME\`—this may indicate an attempt to evade detection mechanisms, suggesting that it could be a tactic employed by attackers. It provides a high-level alert for security analysts, pushing for further investigation when triggered.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2021-03-09