heroui logo

Windows Service Started

Anvilogic Forge

View Source
Summary
This detection rule aims to identify the execution of processes associated with the starting of Windows services, which can be exploited by threat actors to execute malicious commands or payloads. The rule utilizes Splunk queries that filter for specific event codes related to service start actions (EventCode=1) and the use of service control commands (e.g., 'sc', 'net'). The rule collects relevant data fields such as the time of the event, host details, user, process information, and parent process context, aggregating them over time. Adversaries like APT28, APT29, and others are known to misuse Windows services for their operations, and indicators for related malware like Ryuk and WannaCry are also flagged. The techniques this rule covers fall under the execution phase of the cyber kill chain, specifically targeting service execution. The detection logic highlights the significance of monitoring these critical events to prevent or respond to potential threats quickly.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1569.002
  • T1543.003
Created: 2024-02-09