heroui logo

Suspicious Service Installation Script

Sigma Rules

View Source
Summary
This detection rule is designed to identify potentially malicious or suspicious service installation scripts on Windows systems. It focuses on events logged by the Service Control Manager (SCM), specifically Event ID 7045, which indicates a new service has been installed. The rule utilizes specific patterns in the ImagePath of the service to determine if the installation could be exploitative or indicative of privilege escalation attempts. It looks for known scripting engines (such as CScript, PowerShell, WScript, etc.) involved in the service installation and checks for specific command line flags that might suggest a nefarious purpose. The combination of these parameters allows for accurate detection of suspicious activities related to service installations, thereby enhancing the security posture of the Windows environment.
Categories
  • Windows
  • Endpoint
Data Sources
  • Service
  • Logon Session
Created: 2022-03-18