
Summary
This detection rule is designed to identify the installation of Windows services in potentially suspicious directories, particularly within the AppData folder. The rule leverages event logs from the Service Control Manager, specifically targeting Event ID 7045, which indicates that a new service has been created. It checks if the `ImagePath` of the newly installed service contains certain keywords such as '\AppData\', '\\127.0.0.1', or '\\localhost', which can signify an attempt by attackers to create services that may persistently run malicious actions in user profile directories. Additionally, there is an exception for a known legitimate service, the Zoom Sharing Service, which helps minimize false positives. Given its configuration, this rule is crucial for detecting persistence and privilege escalation tactics often employed by threat actors.
Categories
- Windows
- Endpoint
- Cloud
- On-Premise
Data Sources
- Service
- Logon Session
- Process
Created: 2022-03-18