
Summary
This detection rule focuses on identifying unauthorized service creation associated with the KrbRelayUp tool, specifically targeting the service named "KrbSCM". The rule utilizes Windows System Event Logs, particularly monitoring EventCode 7045, which records service creation activities. Given that KrbRelayUp is known for facilitating privilege escalation attacks, detecting this service creation can help security teams swiftly respond to possible intrusions. If this behavior is confirmed malicious, it may indicate an attacker attempting to escalate their privileges on a compromised system, potentially gaining access to sensitive information or further compromising the network. The provided search query is designed to aggregate relevant event data, allowing analysts to assess the context and scope of detected activities.
Categories
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1543.003
Created: 2024-12-10