heroui logo

Windows Service Created Within Public Path

Splunk Security Content

View Source
Summary
The rule "Windows Service Created Within Public Path" detects the creation of Windows Services that are configured to run executables from public paths, identified by examining Windows Event ID 7045 logs. By monitoring the `ImagePath` field, the rule distinguishes legitimate service installations that reside in expected system directories from potentially malicious services that are installed in public locations, which could indicate an attempt by attackers to maintain persistence, facilitate lateral movement, or execute remote code. The detection utilizes the `wineventlog_system` data source, alerting security teams to investigate unusual service creations that deviate from standard practices, enabling a proactive stance against potential security threats.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Logon Session
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1543
  • T1543.003
  • T1569.002
Created: 2024-11-13