
Summary
This rule identifies the creation of suspicious Windows services that might indicate an attempt at privilege escalation or persistence by attackers. In particular, the rule flags services created with suspicious command values often associated with unauthorized system access and the execution of potentially harmful utilities. Such suspicious activities may involve altering or creating services that run as SYSTEM or other privileged accounts, allowing malicious actors to execute arbitrary code with elevated permissions. The rule utilizes EQL (Event Query Language) queries to monitor specific Windows event logs, particularly events 4697 and 7045, which correspond to service installation and creation actions, respectively. By filtering for certain keywords in the service file names or image paths, the identified services are flagged for further investigation. The response guidance included with this rule outlines steps for analyzing suspicious service activities, potentially helping security analysts detect and respond to unauthorized modifications to the system's service configuration.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Application Log
- Logon Session
ATT&CK Techniques
- T1543
- T1543.003
Created: 2022-08-30