heroui logo

Service Installed By Unusual Client - Security

Sigma Rules

View Source
Summary
This rule detects the installation of a service on Windows by a client process that exhibits unusual characteristics. Specifically, it targets those instances where the client process ID (PID) is 0 or when the parent process that initiated the request also has a PID of 0. In general, a PID of 0 is not standard practice for legitimate applications or services and can indicate suspicious activity, such as privilege escalation or malicious software installation. This detection leverages Windows Audit logs, notably monitoring for Event ID 4697, which logs new service installations. The rule is indicative of potential misuse or abnormal behavior in the system's service management mechanisms, prompting further investigation into the client responsible for the service creation. It's critical to have the appropriate audit settings configured in your environment to catch these events, and any incidence of such an event warrants a high level of scrutiny due to the potential security implications.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Application Log
  • Service
Created: 2022-09-15