title: Suspicious Service Binary Directory id: 883faa95-175a-4e22-8181-e5761aeb373c description: Detects a service binary running in a suspicious directory author: Florian Roth date: 2021/03/09 status: experimental references: - https://blog.truesec.com/2021/03/07/exchange-zero-day-proxylogon-and-hafnium/ logsource: category: process_creation product: windows detection: selection: Image|contains: - '\Users\Public\' - '\$Recycle.bin' - '\Users\All Users\' - '\Users\Default\' - '\Users\Contacts\' - '\Users\Searches\' - 'C:\Perflogs\' - '\config\systemprofile\' - '\Windows\Fonts\' - '\Windows\IME\' - '\Windows\addins\' ParentImage|endswith: - '\services.exe' - '\svchost.exe' condition: selection falsepositives: - Unknown level: high