Service installation from user writable directory

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query detects a service installation that is originated from a user writable directory. Ref: https://attack.mitre.org/techniques/T1569/002/

Attribute Value
Type Hunting Query
Solution Windows Security Events
ID 5a9ccb48-1316-46e1-89d1-aca0355c305e
Tactics Execution
Techniques T1569.002
Required Connectors SecurityEvents, WindowsSecurityEvents
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
Event EventID == "7045"
Source == "Service Control Manager"
?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to Windows Security Events