SigmaHQ/rules/windows/builtin/win_rare_service_installs.yml

25 lines
711 B
YAML
Raw Normal View History

2017-03-08 18:09:34 +00:00
title: Rare Service Installs
2019-11-12 22:12:27 +00:00
id: 66bfef30-22a5-4fcd-ad44-8d81e60922ae
2020-03-14 18:58:58 +00:00
description: Detects rare service installs that only appear a few times per time frame and could reveal password dumpers, backdoor installs or other types of malicious services
2017-03-08 18:09:34 +00:00
status: experimental
author: Florian Roth
date: 2017/03/08
2018-07-24 05:50:32 +00:00
tags:
- attack.persistence
- attack.privilege_escalation
- attack.t1050 # an old one
2019-06-14 04:15:38 +00:00
- car.2013-09-005
2020-06-16 20:46:08 +00:00
- attack.t1543.003
2017-03-08 18:09:34 +00:00
logsource:
product: windows
service: system
detection:
selection:
EventID: 7045
timeframe: 7d
condition: selection | count() by ServiceFileName < 5
falsepositives:
2017-03-08 18:09:34 +00:00
- Software installation
- Software updates
level: low