Microsoft-Windows-Security-Auditing › Event 4697

Event ID 4697 — A service was installed in the system.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Security System Extension
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A service was installed in the system.

Message #

A service was installed in the system.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Service Information:
	Service Name: %5
	Service File Name: %6
	Service Type: %7
	Service Start Type: %8
	Service Account: %9

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
ServiceName UnicodeString[Service Information] Service Name.
ServiceFileName UnicodeString[Service Information] Service File Name.
ServiceType HexInt32[Service Information] Service Type.
Known values
1
Kernel Driver
2
File System Driver
4
Adapter
8
Recognizer Driver
16
Own Process
32
Share Process
256
Interactive
ServiceStartType UInt32[Service Information] Service Start Type.
Known values
0
Boot
1
System
2
Automatic
3
Manual
4
Disabled
ServiceAccount UnicodeString[Service Information] Service Account.
ClientProcessStartKey UInt64
ClientProcessId UInt32
ParentProcessId UInt32

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4697,
    "version": 1,
    "level": 0,
    "task": 12289,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-04T14:08:37.173232+00:00",
    "event_record_id": 34393,
    "correlation": {
      "ActivityID": "7377737E-4825-0000-C974-77732548D801"
    },
    "execution": {
      "process_id": 612,
      "thread_id": 3964
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WIN-TKC15D7KHUR$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "ServiceName": "MpKsl6680716f",
    "ServiceFileName": "C:\\ProgramData\\Microsoft\\Windows Defender\\Definition Updates\\{94297FD4-6E63-4B60-B47B-85D76376014D}\\MpKslDrv.sys",
    "ServiceType": "0x1",
    "ServiceStartType": 3,
    "ServiceAccount": "LocalSystem",
    "ClientProcessStartKey": 1407374883553325,
    "ClientProcessId": 1796,
    "ParentProcessId": 604
  },
  "message": ""
}

Detection Patterns #

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Show 17 more (21 total)

Elastic # view in reference

  • Windows Service Installed via an Unusual Client source high: Identifies the creation of a Windows service by an unusual client process. Services may be created with administrator privileges but are executed under SYSTEM privileges, so an adversary may also use a service to escalate privileges from administrator to SYSTEM.

References #