
Summary
The rule 'Suspicious ImagePath Service Creation' is designed to detect the creation of abnormal registry values associated with Windows services, specifically targeting the ImagePath registry key. This could signify that an adversary is compromising the system to gain persistence or escalate privileges through malicious changes to service configurations. The rule uses EQL (Event Query Language) to scan for registry changes with patterns that resemble command shells or named pipes, both of which are common tactics used by attackers to conceal their activities. If such changes are detected, indicative of potentially malicious activity, alerts are triggered, allowing for further investigation and remediation. The rule includes a detailed triage and investigation guide to assist analysts in understanding the context of alerts and identifying false positives effectively. Authorities must take timely actions based on alerts to isolate affected systems and terminate any suspicious processes.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Application Log
- Network Traffic
ATT&CK Techniques
- T1543
- T1543.003
- T1112
Created: 2020-11-23