
Summary
This detection rule focuses on identifying unauthorized privileged operations being performed on the SCM (Service Control Manager) database by non-system users on Windows systems. Specifically, it is designed to signal alerts when a user with a logon ID that is not the system (0x3e4) attempts to exercise the 'SeTakeOwnershipPrivilege' privilege on active services through the SCM. The rule filters events to ensure that the operations are conducted using the 'services.exe' process, which is the official Windows process for service management. The detection criterion is based on the Event ID 4674, which logs security-sensitive operations in the Windows Event Log. This rule aids in preventing privilege escalation attacks, whereby an attacker or a non-privileged user attempts to gain higher access levels to system resources, potentially leading to unauthorized service modifications and heightened security risks.
Categories
- Windows
Data Sources
- Windows Registry
- Application Log
- Process
Created: 2019-08-15