
Summary
The detection rule for 'Windows Service Create RemComSvc' identifies the creation of the 'RemComSvc' service on Windows endpoints, an indicator often associated with lateral movement activities using the RemCom.exe tool. This rule utilizes Windows Event Code 7045 from the System event log to monitor for entries related to the 'RemCom Service'. Unauthorized creation of this service can represent a tactical maneuver used by adversaries to propagate malware or escalate access privileges within network environments. Confirmation of this activity necessitates further investigation as it can lead to unauthorized access to critical systems, potential data exfiltration, or broader compromises within the network infrastructure. To implement this detection, the logging of Windows Event Code 7045 is essential, along with the usage of the Windows TA for Splunk. Although the event tracking could generate false positives—particularly from legitimate administrative activities—the rule serves as a significant alert for ongoing malicious behavior.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Application Log
ATT&CK Techniques
- T1543.003
- T1543
Created: 2024-11-13