heroui logo

First Time Seen Running Windows Service

Splunk Security Content

View Source
Summary
This rule detects the first occurrence of a Windows service transitioning to the 'running' state in a monitored environment. It utilizes Windows Event Log entries, specifically looking for EventCode 7036, which indicates a service state change. Identifying new services is crucial in exposing potentially unauthorized installations, which may suggest malware presence or unauthorized software in the system. If such activity is confirmed as malicious, it could lead to executing arbitrary code, gaining persistence, or privilege escalation. The implementation of this detection requires proper setup of Windows event log ingestion and a baseline creation to track previously seen services. Continuous monitoring for new services will contribute significantly to early threat detection.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Logon Session
  • Application Log
ATT&CK Techniques
  • T1569
  • T1569.002
Created: 2024-11-13