
Summary
The 'Unusual Windows Service' detection rule is designed to identify atypical Windows services that may indicate unauthorized actions, such as malware deployment or persistence mechanisms. Utilizing a machine learning job, this rule analyzes service behavior on Windows hosts, where rare services are often flagged as suspicious. The setup requires installation of the Elastic Defend and Windows integrations to facilitate data input for the machine learning model. Upon activation, the corresponding machine learning job automatically starts and monitors for anomalies over a defined interval. False positives remain a concern, particularly for newly installed applications or rarely used services, necessitating careful investigation of flagged services. The rule's risk score is rated low; however, the context surrounding the detection may indicate genuine threats requiring immediate investigation. Investigative steps include reviewing service details, creation timestamps, user account privileges, and cross-referencing with known threats, ensuring a comprehensive approach to identifying potential malicious activities.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1543
- T1543.003
Created: 2020-03-25