
Summary
The analytic rule identifies instances where 'services.exe' spawns a process that falls under the category of LOLBAS (Living Off the Land Binaries and Scripts). The detection is crucial in monitoring potential abuse of the Service Control Manager by adversaries who may use legitimate Windows features for malicious purposes, including lateral movement. The rule relies on multiple data sources, particularly focusing on process creation events, and raises alarms when a predefined list of LOLBAS processes are launched by 'services.exe'. This mechanism helps security teams flag potential threats, such as unauthorized code execution or privilege escalation, thus addressing severe risks to the security of an environment.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- User Account
ATT&CK Techniques
- T1543
- T1543.003
Created: 2024-11-13