heroui logo

Remote Windows Service Installed

Elastic Detection Rules

View Source
Summary
The detection rule named 'Remote Windows Service Installed' targets scenarios where a Windows service is created following a network logon with the same LogonId, which can indicate potential lateral movement in the network. This rule operates within the context of the Elastic Stack and requires a Windows log source. The rule utilizes EQL (Event Query Language) to detect sequences of events: first, a successful network logon event is recorded, and secondly, a service installation event that does not involve known legitimate services. Administrators should exercise care as the rule may yield false positives due to legitimate administrative activities, which the rule attempts to manage by filtering out common service paths. Typical investigation steps include analyzing the source IP of the logon, correlating the logon with the service installation, and assessing the legitimacy of the service being installed. Effective response strategies involve isolating affected systems, terminating unauthorized services, and conducting a thorough review of user activities to detect potential breaches.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Logon Session
  • Process
  • Service
ATT&CK Techniques
  • T1021
  • T1543
  • T1543.003
Created: 2022-08-30