Detection rules › By event
Service-Control-Manager event 7045
Sigma (41)
- Anydesk Remote Access Software Service Installation
- CobaltStrike Service Installations - System
- Credential Dumping Tools Service Execution - System
- CSExec Service Installation
- HackTool Service Registration or Execution
- Invoke-Obfuscation CLIP+ Launcher - System
- Invoke-Obfuscation COMPRESS OBFUSCATION - System
- Invoke-Obfuscation Obfuscated IEX Invocation - System
- Invoke-Obfuscation RUNDLL LAUNCHER - System
- Invoke-Obfuscation STDIN+ Launcher - System
- Invoke-Obfuscation VAR+ Launcher - System
- Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION - System
- Invoke-Obfuscation Via Stdin - System
- Invoke-Obfuscation Via Use Clip - System
- Invoke-Obfuscation Via Use MSHTA - System
- Invoke-Obfuscation Via Use Rundll32 - System
- KrbRelayUp Service Installation
- Mesh Agent Service Installation
- Meterpreter or Cobalt Strike Getsystem Service Installation - System
- Moriya Rootkit - System
- NetSupport Manager Service Install
- New PDQDeploy Service - Client Side
- New PDQDeploy Service - Server Side
- PAExec Service Installation
- PowerShell Scripts Installed as Services
- ProcessHacker Privilege Elevation
- PsExec Service Installation
- RemCom Service Installation
- Remote Access Tool Services Have Been Installed - System
- Remote Utilities Host Service Install
- RTCore Suspicious Service Installation
- Service Installation in Suspicious Folder
- Service Installation with Suspicious Folder Pattern
- Service Installed By Unusual Client - System
- Sliver C2 Default Service Installation
- smbexec.py Service Installation
- Suspicious Service Installation
- Suspicious Service Installation Script
- TacticalRMM Service Installation
- Tap Driver Installation
- Uncommon Service Installation Image Path
Elastic (1)
Splunk (12)
- Clop Ransomware Known Service Name
- Malicious Powershell Executed As A Service
- Randomly Generated Windows Service Name
- Windows Bluetooth Service Installed From Uncommon Location
- Windows Driver Load Non-Standard Path
- Windows KrbRelayUp Service Creation
- Windows Service Create RemComSvc
- Windows Service Create SliverC2
- Windows Service Created with Suspicious Service Name
- Windows Service Created with Suspicious Service Path
- Windows Snake Malware Service Create
- Windows Vulnerable Driver Installed