Files
blue-team-tools/rules/windows/builtin/system/win_system_service_install_hacktools.yml
T
Nasreddine Bencherchali 80ef3b70dc fix: broken single item lists
2022-12-08 16:23:58 +01:00

36 lines
966 B
YAML

title: Hacktool Service Registration or Execution
id: d26ce60c-2151-403c-9a42-49420d87b5e4
status: experimental
description: Detects PsExec service installation and execution events (service and Sysmon)
references:
- Internal Research
author: Florian Roth
date: 2022/03/21
tags:
- attack.execution
- attack.t1569.002
- attack.s0029
logsource:
product: windows
service: system
detection:
service:
Provider_Name: 'Service Control Manager'
EventID:
- 7045
- 7036
selection:
- ServiceName|contains:
- 'WCESERVICE'
- 'WCE SERVICE'
- 'winexesvc'
- 'DumpSvc'
- 'pwdump'
- 'gsecdump'
- 'cachedump'
- ImagePath|contains: 'bypass' # https://gist.github.com/tyranid/c24cfd1bd141d14d4925043ee7e03c82#file-scmuacbypass-cpp-L159
condition: service and selection
falsepositives:
- Unknown
level: high