SigmaHQ/rules/windows/builtin/win_rare_service_installs.yml
Roberto Rodriguez c8990962d2 Update win_rare_service_installs.yml
same count() by ServiceFileName < 5 aded to make sigmac work with elastalert integration
2018-12-05 05:33:56 +03:00

20 lines
588 B
YAML

title: Rare Service Installs
description: Detects rare service installs that only appear a few times per time frame and could reveal password dumpers, backdoor installs or other types of malicious services
status: experimental
author: Florian Roth
tags:
- attack.persistence
- attack.privilege_escalation
- attack.t1050
logsource:
product: windows
service: system
detection:
selection:
EventID: 7045
timeframe: 7d
condition: selection | count() by ServiceFileName < 5
falsepositives:
- Software installation
- Software updates
level: low