2017-11-01 22:12:14 +01:00
action : global
2017-03-31 19:31:13 +02:00
title : APT29 Google Update Service Install
2019-11-12 23:12:27 +01:00
id : c069f460-2b87-4010-8dcf-e45bab362624
description : This method detects malicious services mentioned in APT29 report by FireEye. The legitimate path for the Google update service is C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
so the service names and executable locations used by APT29 are specific enough to be detected in log files.
2018-01-28 02:24:16 +03:00
references :
- https://www.fireeye.com/blog/threat-research/2017/03/apt29_domain_frontin.html
2018-07-25 09:50:01 +02:00
tags :
2019-03-13 09:25:28 +00:00
- attack.persistence
2018-07-25 09:50:01 +02:00
- attack.g0016
2019-03-13 09:25:28 +00:00
- attack.t1050
2019-03-04 16:13:27 +03:00
logsource :
product : windows
2019-03-04 16:44:30 +03:00
service : system
2017-11-01 22:12:14 +01:00
detection :
2019-03-04 16:44:30 +03:00
service_install :
2019-03-04 16:13:27 +03:00
EventID : 7045
ServiceName : 'Google Update'
2019-03-04 16:51:39 +03:00
timeframe : 5m
condition : service_install | near process
falsepositives :
- Unknown
level : high
2017-11-01 22:12:14 +01:00
---
2019-03-04 16:13:27 +03:00
logsource :
category : process_creation
product : windows
2017-11-01 22:12:14 +01:00
detection :
process :
Image :
- 'C:\Program Files(x86)\Google\GoogleService.exe'
- 'C:\Program Files(x86)\Google\GoogleUpdate.exe'