
Summary
This detection rule identifies the execution of randomly named binaries via `services.exe`, which is characteristic of privilege escalation tactics used by adversaries such as Cobalt Strike's `svc-exe`. It utilizes data collected from Endpoint Detection and Response (EDR) agents to monitor process lineage and command-line arguments. The behavior typically indicates an attacker attempting to gain elevated privileges after initial access, which can lead to further exploitation, arbitrary code execution, and persistence within the network system. The primary data sources include Sysmon events for process creation and Windows Event Log security logs. If this activity is confirmed as malicious, it represents a critical threat vector, as it potentially allows attackers to maintain long-term access and lateral movement capabilities.
Categories
- Endpoint
- Windows
Data Sources
- Pod
- Windows Registry
- Process
- File
- Command
ATT&CK Techniques
- T1548
- T1055
Created: 2024-12-10