SigmaHQ/rules/windows/builtin/win_mal_service_installs.yml

38 lines
1.0 KiB
YAML
Raw Normal View History

2018-01-27 09:57:30 +00:00
title: Malicious Service Installations
description: Detects known malicious service installs that only appear in cases of lateral movement, credential dumping and other suspicious activity
author: Florian Roth
2018-07-24 05:50:32 +00:00
tags:
- attack.persistence
- attack.privilege_escalation
- attack.t1050
2019-06-14 04:15:38 +00:00
- car.2013-09-005
logsource:
product: windows
service: system
detection:
selection:
EventID: 7045
malsvc_wce:
ServiceName:
- 'WCESERVICE'
- 'WCE SERVICE'
malsvc_paexec:
ServiceFileName: '*\PAExec*'
malsvc_winexe:
ServiceFileName: 'winexesvc.exe*'
malsvc_pwdumpx:
ServiceFileName: '*\DumpSvc.exe'
malsvc_wannacry:
2017-05-15 14:06:16 +00:00
ServiceName: 'mssecsvc2.0'
malsvc_persistence:
2017-08-16 13:16:41 +00:00
ServiceFileName: '* net user *'
malsvc_others:
ServiceName:
- 'pwdump*'
- 'gsecdump*'
- 'cachedump*'
condition: selection and 1 of malsvc_*
falsepositives:
- Penetration testing
level: critical