heroui logo

Service Installation with Suspicious Folder Pattern

Sigma Rules

View Source
Summary
This detection rule is designed to monitor the Windows operating system for suspicious service installations based on the folder patterns where the executable files are located. The rule focuses on events generated by the Service Control Manager, specifically looking for Event ID 7045, which indicates that a new service has been installed. The detection conditions incorporate regular expressions to identify executables that are located in the 'ProgramData' folder or other atypical directories, suggesting potential malicious activity. Anomalous service installations can be a precursor to malware persistence or privilege escalation, making this rule critical for identifying potential threats. Given the high-sensitivity nature of the rule, false positives are marked as 'Unknown' due to the variability in legitimate service installations.
Categories
  • Windows
  • Endpoint
Data Sources
  • Service
  • Application Log
Created: 2022-03-18