title: Suspect Svchost Memory Asccess id: 166e9c50-8cd9-44af-815d-d1f0c0e90dde status: experimental description: Detects suspect access to svchost process memory such as that used by Invoke-Phantom to kill the winRM windows event logging service. author: Tim Burrell date: 2020/01/02 modified: 2020/08/24 references: - https://github.com/hlldz/Invoke-Phant0m - https://twitter.com/timbmsft/status/900724491076214784 tags: - attack.defense_evasion - attack.t1562.002 - attack.t1089 # an old one logsource: category: process_access product: windows detection: selection: TargetImage: '*\windows\system32\svchost.exe' GrantedAccess: '0x1f3fff' CallTrace: - '*unknown*' condition: selection falsepositives: - unknown level: high