
Summary
The 'Suspicious Service Installation' rule is designed to detect potentially malicious commands that install services on Windows systems, with a particular focus on the Service Control Manager events. The rule specifically looks for Event ID 7045, which indicates a new service being installed, and filters these events based on the presence of suspicious parameters in the service installation commands. The detection logic uses a combination of the command line arguments to identify unusual or potentially harmful patterns, such as the use of hidden windows, temporary file paths, and other commands associated with malicious activity. Examples include service installation commands that involve '-nop', '-sta', or pointing to temporary or administrative directories. The rule is categorized under attack techniques related to persistence and privilege escalation, reflecting its purpose of identifying actions that may allow an attacker to maintain access or increase their control over a system.
Categories
- Windows
Data Sources
- Service
- Application Log
Created: 2022-03-18