EXPLORE
← Back to Explore
sigmahighHunting

Service Installation with Suspicious Folder Pattern

Detects service installation with suspicious folder patterns

MITRE ATT&CK

persistenceprivilege-escalation

Detection Query

selection_eid:
  Provider_Name: Service Control Manager
  EventID: 7045
selection_img_paths:
  - ImagePath|re: ^[Cc]:\\[Pp]rogram[Dd]ata\\.{1,9}\.exe
  - ImagePath|re: ^[Cc]:\\.{1,9}\.exe
condition: all of selection_*

Author

pH-T (Nextron Systems)

Created

2022-03-18

Data Sources

windowssystem

Platforms

windows

Tags

attack.persistenceattack.privilege-escalationcar.2013-09-005attack.t1543.003
Raw Content
title: Service Installation with Suspicious Folder Pattern
id: 1b2ae822-6fe1-43ba-aa7c-d1a3b3d1d5f2
status: test
description: Detects service installation with suspicious folder patterns
references:
    - Internal Research
author: pH-T (Nextron Systems)
date: 2022-03-18
modified: 2022-03-24
tags:
    - attack.persistence
    - attack.privilege-escalation
    - car.2013-09-005
    - attack.t1543.003
logsource:
    product: windows
    service: system
detection:
    selection_eid:
        Provider_Name: 'Service Control Manager'
        EventID: 7045
    selection_img_paths:
        - ImagePath|re: '^[Cc]:\\[Pp]rogram[Dd]ata\\.{1,9}\.exe'
        - ImagePath|re: '^[Cc]:\\.{1,9}\.exe'
    condition: all of selection_*
falsepositives:
    - Unknown
level: high