Rules: Windows Service Executed from Nonstandard Execution Path
Windows services launching from locations outside of their standard installation path is a common malware persistence mechanism.
Detail | Value |
---|---|
Type | Match |
Category | Persistence |
Apply Risk to Entities | device_hostname, device_ip, user_username |
Signal Name | Windows Service Executed from Nonstandard Execution Path |
Summary Expression | Detected service: {{baseImage}} execution from nonstandard path on host: {{device_hostname}} |
Score/Severity | Static: 7 |
Enabled by Default | True |
Prototype | False |
Tags | _mitreAttackTactic:TA0002, _mitreAttackTactic:TA0003, _mitreAttackTactic:TA0005, _mitreAttackTechnique:T1036, _mitreAttackTechnique:T1036.003, _mitreAttackTechnique:T1036.004, _mitreAttackTechnique:T1036.005, _mitreAttackTechnique:T1569, _mitreAttackTechnique:T1569.002 |
Origin | Field |
---|---|
Normalized Schema | baseImage |
Normalized Schema | device_hostname |
Normalized Schema | device_ip |
Normalized Schema | lower |
Normalized Schema | user_username |