
Summary
This detection rule identifies the installation of the PAExec service in Windows environments by monitoring the Service Control Manager (SCM) for specific event logs. The rule is triggered by checking for Event ID 7045, which indicates that a service has been installed. It further narrows down the detection by looking for services that start with 'PAExec-' or have an image path that begins with 'C:\WINDOWS\PAExec-'. The logic ensures that only those installations pertaining to PAExec are flagged, reducing false positives. The rule is essential for detecting unauthorized execution capabilities often leveraged in lateral movement or privilege escalation by attackers.
Categories
- Windows
- Endpoint
Data Sources
- Service
- Logon Session
- Process
Created: 2022-10-26