Files
blue-team-tools/rules/windows/sysmon/sysmon_service_creation.yml
T
2019-08-28 17:13:54 +07:00

19 lines
367 B
YAML

title: Service Creation in Registry Detection
description: Detect Service Creation in Registry
author: Lep
date: 2019/08/16
tags:
- attack.execution
- attack.t1035
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 12
Image_lc: '*\services.exe'
condition: selection
falsepositives:
- n/a
level: low