
Summary
This detection rule identifies potential privilege escalation attempts in Windows environments caused by modifications to service configuration. The focus is on monitoring processes with a Medium integrity level that attempt to change service-related settings in the Windows Registry, particularly the ImagePath, FailureCommand, and ServiceDLL attributes. When a process with a Medium integrity level (denoted as S-1-16-8192) interacts with the registry to modify these settings, it may indicate an unauthorized effort to escalate privileges, as these configurations can impact how services operate and are invoked by the system. The rule uses specific command-line patterns related to service settings and requires a logging source related to process creation for effective detection. False positives are marked as unknown, highlighting that any alerts should be investigated due to the potential critical nature of the threat.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
Created: 2019-10-26