heroui logo

Detect Path Interception By Creation Of program exe

Splunk Security Content

View Source
Summary
This analytic rule identifies the creation of a program executable in an unquoted service path, which is a well-known privilege escalation technique used by attackers. The detection leverages various data sources from Endpoint Detection and Response (EDR) agents, particularly focusing on process creation events where the parent process is 'services.exe'. The significance of monitoring unquoted service paths lies in the potential for attackers to exploit these paths to execute arbitrary code with elevated privileges. If flagged as malicious, this activity could allow an attacker to gain escalated access, ultimately leading to full system compromise. The rule searches for instances where the process name differs from the service process name, providing a robust detection mechanism for such threats.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • Windows Registry
  • Service
ATT&CK Techniques
  • T1574.009
  • T1574
Created: 2024-11-13