
Summary
This detection rule identifies the creation of a new service on a remote Windows endpoint using the command line tool 'sc.exe'. The rule leverages telemetry from Endpoint Detection and Response (EDR) solutions, focused particularly on monitoring EventCode 7045 which signals a new service being created. Such activity raises potential alarms as it may indicate lateral movement, remote code execution, or persistence mechanisms being employed by an attacker. If the creation of services occurs without legitimate administrative intent, it could be an indicator of malicious behavior, leading to privilege escalation or further exploitation of the network. The rule aggregates relevant log data from various sources, making use of the Splunk platform's capabilities to analyze and alert on this potentially harmful behavior.
Categories
- Endpoint
Data Sources
- Process
- Windows Registry
- Windows Registry
- Cloud Service
ATT&CK Techniques
- T1543
- T1543.003
Created: 2024-11-13