Skip to content

Latest commit

 

History

History
33 lines (26 loc) · 1.27 KB

LEGACY-S00171.md

File metadata and controls

33 lines (26 loc) · 1.27 KB

Rules: Windows Service Executed from Nonstandard Execution Path

Description

Windows services launching from locations outside of their standard installation path is a common malware persistence mechanism.

Additional Details

Detail Value
Type Match
Category Persistence
Apply Risk to Entities device_hostname, device_ip, user_username
Signal Name Windows Service Executed from Nonstandard Execution Path
Summary Expression Detected service: {{baseImage}} execution from nonstandard path on host: {{device_hostname}}
Score/Severity Static: 7
Enabled by Default True
Prototype False
Tags _mitreAttackTactic:TA0002, _mitreAttackTactic:TA0003, _mitreAttackTactic:TA0005, _mitreAttackTechnique:T1036, _mitreAttackTechnique:T1036.003, _mitreAttackTechnique:T1036.004, _mitreAttackTechnique:T1036.005, _mitreAttackTechnique:T1569, _mitreAttackTechnique:T1569.002

Vendors and Products

Fields Used

Origin Field
Normalized Schema baseImage
Normalized Schema device_hostname
Normalized Schema device_ip
Normalized Schema lower
Normalized Schema user_username