
Summary
The detection rule titled 'HackTool Service Registration or Execution' is designed to identify the installation or execution of potentially malicious services on Windows systems. This is achieved by monitoring events generated by the Service Control Manager, specifically Event IDs 7045 (Service Installation) and 7036 (Service State Change). The rule is focused on recognizing specific service names and image paths that are commonly associated with hacking tools. For example, the rule looks for services that contain names such as 'cachedump', 'DumpSvc', 'gsecdump', 'pwdump', and other known variants, as well as an image path that has the term 'bypass' in it. By employing a logical condition that combines these selections, the rule aims to flag any unusual service registrations that could indicate the presence of hacking tools on the system.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Service
Created: 2022-03-21