← Back to Explore
sigmahighHunting
Service Installation with Suspicious Folder Pattern
Detects service installation with suspicious folder patterns
Detection Query
selection_eid:
Provider_Name: Service Control Manager
EventID: 7045
selection_img_paths:
- ImagePath|re: ^[Cc]:\\[Pp]rogram[Dd]ata\\.{1,9}\.exe
- ImagePath|re: ^[Cc]:\\.{1,9}\.exe
condition: all of selection_*
Author
pH-T (Nextron Systems)
Created
2022-03-18
Data Sources
windowssystem
Platforms
windows
References
Tags
attack.persistenceattack.privilege-escalationcar.2013-09-005attack.t1543.003
Raw Content
title: Service Installation with Suspicious Folder Pattern
id: 1b2ae822-6fe1-43ba-aa7c-d1a3b3d1d5f2
status: test
description: Detects service installation with suspicious folder patterns
references:
- Internal Research
author: pH-T (Nextron Systems)
date: 2022-03-18
modified: 2022-03-24
tags:
- attack.persistence
- attack.privilege-escalation
- car.2013-09-005
- attack.t1543.003
logsource:
product: windows
service: system
detection:
selection_eid:
Provider_Name: 'Service Control Manager'
EventID: 7045
selection_img_paths:
- ImagePath|re: '^[Cc]:\\[Pp]rogram[Dd]ata\\.{1,9}\.exe'
- ImagePath|re: '^[Cc]:\\.{1,9}\.exe'
condition: all of selection_*
falsepositives:
- Unknown
level: high