<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Service_creation — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/service_creation/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 12 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/service_creation/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detect Suspicious Windows Service Installation</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-service-installation/</link><pubDate>Fri, 12 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-service-installation/</guid><description>This detection identifies the creation of new Windows services with suspicious command values, often used for privilege escalation and persistence by malicious actors.</description><content:encoded><![CDATA[<p>Attackers frequently abuse Windows services for persistence and privilege escalation. By creating or modifying services with malicious configurations, they can execute code with SYSTEM privileges. This rule detects suspicious service creations based on the image path, looking for services that point to command interpreters, scripts, or unusual locations. This activity is indicative of malicious actors attempting to establish persistence or escalate privileges within a compromised system. The detection focuses on identifying unusual command lines and file paths associated with newly created services based on Windows Event IDs 4697 and 7045.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the system through various means.</li>
<li>Privilege Escalation: The attacker attempts to escalate privileges to SYSTEM.</li>
<li>Service Creation: The attacker creates a new Windows service using tools like <code>sc.exe</code> or modifies an existing one.</li>
<li>Image Path Modification: The attacker sets the service&rsquo;s <code>ImagePath</code> to point to a command interpreter (e.g., cmd.exe, powershell.exe) or a script file.</li>
<li>Command Execution: The service executes the command interpreter or script with SYSTEM privileges.</li>
<li>Persistence: The attacker configures the service to start automatically on system boot, ensuring persistent access.</li>
<li>Malicious Activity: The attacker uses the elevated privileges to perform malicious activities, such as installing malware, stealing credentials, or compromising other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to the compromised system with SYSTEM privileges. This can lead to complete system compromise, data theft, installation of ransomware, and lateral movement to other systems within the network. The impact includes potential data breaches, financial losses, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Security Event Logs and Windows System Event Logs to capture service creation events (Event IDs 4697 and 7045).</li>
<li>Deploy the Sigma rule <code>Suspicious Service Installation via ImagePath</code> to your SIEM to detect suspicious service creations.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the service&rsquo;s <code>ImagePath</code> and associated processes.</li>
<li>Use the Osquery queries provided in the source to investigate existing services, unsigned executables, and drivers for suspicious characteristics.</li>
<li>Monitor for registry changes related to service creation or modification.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege_escalation</category><category>windows</category><category>service_creation</category></item></channel></rss>