
Summary
The 'New Service Creation Using PowerShell' detection rule is designed to identify instances where a new service is created in a Windows environment using PowerShell commands. The rule focuses specifically on PowerShell's 'New-Service' command that includes a 'BinaryPathName', a common method used by threat actors to install malicious services for persistence or privilege escalation. The detection utilizes process creation logs, monitoring for specific command-line arguments indicating service creation. This rule is part of the ATT&CK framework, specifically aligned with the persistence and privilege escalation tactics. False positives may occur from legitimate administrative actions or software installations, making it essential to contextualize alerts against known normal operational behavior.
Categories
- Windows
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1543.003
Created: 2023-02-20