heroui logo

Uncommon Service Installation Image Path

Sigma Rules

View Source
Summary
The detection rule titled 'Uncommon Service Installation Image Path' aims to identify potentially suspicious service installations on Windows systems by analyzing the image paths used during these creations. Specifically, it targets commands that utilize uncommon or suspicious paths, potentially indicating malicious activity, such as the execution of encoded PowerShell commands from unusual locations. The rule looks for logs generated by the Service Control Manager with Event ID 7045, signifying the creation of a new service. It flags image paths containing certain encoded PowerShell command patterns or references to temporary directories that are atypical for legitimate service installations, including paths like '\Users\Public\' and '\Windows\Temp\'. Additionally, it checks for well-known encoded keywords that might signal obfuscation attempts for executing commands, enhancing threat detection capabilities against persistence techniques employed by malware.
Categories
  • Windows
Data Sources
  • Windows Registry
  • Logon Session
  • Application Log
  • Process
Created: 2022-03-18