2018-03-05 10:29:42 +00:00
---
2017-11-01 21:12:14 +00:00
action : global
2017-03-31 17:31:13 +00:00
title : APT29 Google Update Service Install
2017-04-01 08:30:36 +00:00
description : 'This method detects malicious services mentioned in APT29 report by FireEye. The legitimate path for the Google update service is C:\Program Files (x86)\Google\Update\GoogleUpdate.exe so the service names and executable locations used by APT29 are specific enough to be detected in log files.'
2018-01-27 23:24:16 +00:00
references :
- https://www.fireeye.com/blog/threat-research/2017/03/apt29_domain_frontin.html
2018-07-25 07:50:01 +00:00
tags :
- attack.command_and_control
- attack.g0016
- attack.t1172
2019-03-04 13:13:27 +00:00
logsource :
product : windows
2019-03-04 13:44:30 +00:00
service : system
2017-11-01 21:12:14 +00:00
detection :
2019-03-04 13:44:30 +00:00
service_install :
2019-03-04 13:13:27 +00:00
EventID : 7045
ServiceName : 'Google Update'
2019-03-04 13:51:39 +00:00
timeframe : 5m
condition : service_install | near process
falsepositives :
- Unknown
level : high
2017-11-01 21:12:14 +00:00
---
2019-03-04 13:13:27 +00:00
logsource :
category : process_creation
product : windows
2017-11-01 21:12:14 +00:00
detection :
process :
Image :
- 'C:\Program Files(x86)\Google\GoogleService.exe'
- 'C:\Program Files(x86)\Google\GoogleUpdate.exe'