- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Classification:
attack
Tactic:
Technique:
Detects the installation of Windows services by suspicious or unusual client processes.
This detection monitors Windows event logs through two separate queries targeting different log sources. The first query examines Security Event logs for Event ID 4697 (A service was installed in the system) where either the ClientProcessId or ParentProcessId is 0, excluding known legitimate services. The second query looks at System Event logs for Event ID 7045 (A new service was installed) with ProcessID 0 from the “Service Control Manager” provider.
Windows services provide a way to execute code with SYSTEM privileges and persist across reboots, making them attractive targets for attackers seeking to maintain access to compromised systems. The detection excludes known legitimate services from vendors like PDQ and Ivanti to reduce false positives.
{{host}}
system where the suspicious service installation occurred.