HackTool Service Registration or Execution
Detects installation or execution of services
Sigma rule (View on GitHub)
1title: HackTool Service Registration or Execution
2id: d26ce60c-2151-403c-9a42-49420d87b5e4
3status: test
4description: Detects installation or execution of services
5references:
6 - Internal Research
7author: Florian Roth (Nextron Systems)
8date: 2022-03-21
9modified: 2023-08-07
10tags:
11 - attack.execution
12 - attack.t1569.002
13 - attack.s0029
14logsource:
15 product: windows
16 service: system
17detection:
18 selection_eid:
19 Provider_Name: 'Service Control Manager'
20 EventID:
21 - 7045
22 - 7036
23 selection_service_name:
24 ServiceName|contains:
25 - 'cachedump'
26 - 'DumpSvc'
27 - 'gsecdump'
28 - 'pwdump'
29 - 'UACBypassedService'
30 - 'WCE SERVICE'
31 - 'WCESERVICE'
32 - 'winexesvc'
33 selection_service_image:
34 ImagePath|contains: 'bypass' # https://gist.github.com/tyranid/c24cfd1bd141d14d4925043ee7e03c82#file-scmuacbypass-cpp-L159
35 condition: selection_eid and 1 of selection_service_*
36falsepositives:
37 - Unknown
38level: high
References
Related rules
- CSExec Service File Creation
- PUA - NSudo Execution
- PUA - NirCmd Execution
- PUA - NirCmd Execution As LOCAL SYSTEM
- PUA - RunXCmd Execution