
Summary
The detection rule for ServiceDll Hijack focuses on monitoring changes to the 'ServiceDLL' value in the Windows registry, specifically targeting registry paths associated with services. The rule is relevant for identifying potential persistence mechanisms employed by attackers, as malicious actors may manipulate these registry entries to maintain access to compromised systems. The condition for alerting is met when targeted registry modifications are detected in locations typically used for legitimate services, while applying filters to reduce false positives arising from normal administrative actions or service installations. Filters account for specific images and key service parameters that might indicate legitimate operations versus potential malicious behavior. This rule assesses the context of the modification to ensure that it does not trigger alerts for commonly executed administrative tasks or authorized system functions. Based on the defined conditions and filters, the detection is categorized with a medium severity level, highlighting its significance in identifying possible privilege escalation or persistence tactics.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Service
ATT&CK Techniques
- T1543.003
Created: 2022-02-04