Skip to content

Commit f06f5cd

Browse files
committed
rename rule and enhance metadata
1 parent 4ed661a commit f06f5cd

File tree

1 file changed

+4
-5
lines changed

1 file changed

+4
-5
lines changed

detections/endpoint/windows_service_creation_using_registry_entry.yml renamed to detections/endpoint/windows_service_creation.yml

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
1-
name: Windows Service Creation Using Registry Entry
1+
name: Windows Service Creation
22
id: 25212358-948e-11ec-ad47-acde48001122
33
version: 8
44
date: '2025-01-03'
55
author: Teoderick Contreras, Splunk, Steven Dick
66
status: production
77
type: Anomaly
8-
description: The following analytic detects the modification of registry keys that define Windows services using reg.exe. This detection leverages Splunk to search for specific keywords in the registry path, value name, and value data fields. This activity is significant because it indicates potential unauthorized changes to service configurations, a common persistence technique used by attackers. If confirmed malicious, this could allow an attacker to maintain access, escalate privileges, or move laterally within the network, leading to data theft, ransomware, or other damaging outcomes.
8+
description: The following analytic detects modifications to the "ImagePath" registry value part of registry keys that define Windows services "HKLM\\System\\CurrentControlSet\\Services\\*". This activity can be significant because it indicates potential unauthorized service creation, a common persistence technique used by attackers. If confirmed malicious, this could allow an attacker to maintain access, escalate privileges, or move laterally within the network, leading to data theft, ransomware, or other damaging outcomes.
99
data_source:
1010
- Sysmon EventID 12
1111
- Sysmon EventID 13
@@ -14,13 +14,12 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1414
= ImagePath) BY Registry.dest Registry.user Registry.registry_path
1515
Registry.registry_key_name Registry.registry_value_name Registry.registry_value_data
1616
Registry.process_guid | `drop_dm_object_name(Registry)` | where isnotnull(registry_value_data)
17-
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `windows_service_creation_using_registry_entry_filter`'
17+
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `windows_service_creation_filter`'
1818
how_to_implement: To successfully implement this search, you need to be ingesting
1919
logs with the registry value name, registry path, and registry value data from your
2020
endpoints. If you are using Sysmon, you must have at least version 2.0 of the official
2121
Sysmon TA. https://splunkbase.splunk.com/app/5709
22-
known_false_positives: Third party tools may used this technique to create services
23-
but not so common.
22+
known_false_positives: Third party tools may used this technique to create services but not so common.
2423
references:
2524
- https://github.com/redcanaryco/atomic-red-team/blob/36d49de4c8b00bf36054294b4a1fcbab3917d7c5/atomics/T1574.011/T1574.011.md
2625
drilldown_searches:

0 commit comments

Comments
 (0)