- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Classification:
attack
Tactic:
Technique:
Detects installation of the Moriya rootkit, a sophisticated kernel-mode backdoor used in targeted attacks.
This detection monitors Windows event logs for service installation events where Event ID 7045 is recorded with specific characteristics known to be associated with the Moriya rootkit. The detection specifically looks for the service name “ZzNetSvc” being registered through the Service Control Manager.
Moriya is a sophisticated kernel-mode rootkit that operates as a passive backdoor, allowing attackers to maintain persistent access while evading detection. It operates by registering a Windows service using specific identifiers, which this detection targets. The rootkit intercepts network traffic and can execute arbitrary commands with kernel-level privileges, making it an extremely dangerous threat when deployed.
{{host}}
where the Moriya rootkit service was installed.