LoFP LoFP / t1569.002

t1569.002

TitleTags
a dns lookup does not necessarily mean a successful attempt, verify a) if there was a response using the zeek answers field, if there was then verify the connections (conn.log) to those ips. b) verify if http, ssl, or tls activity to the domain that was queried. http.log field is 'host' and ssl/tls is 'server_name'.
a previously unseen service is not necessarily malicious. verify that the service is legitimate and that was installed by a legitimate process.
administrative tasks on remote services
creating a hidden powershell service is rare and could key off of those instances.
excessive execution of sc.exe is quite suspicious since it can modify or execute app in high privilege permission.
false positives may occur if a user called rundll32 from cli with no options
false positives should be limited as this is a strict primary indicator used by snake malware.
false positives should be limited, but if another service out there is named sliver, filtering may be needed.
legitimate administrator activity
legitimate administrator or user executes a service for legitimate reasons.
legitimate administrator using credential dumping tool for password recovery
legitimate applications may install services with uncommon services paths.
legitimate use by administrators
limited false positives should be present. it is possible some third party applications may use older versions of psexec, filter as needed.
possible, different agents with a 8 character binary and a 4, 8 or 16 character service name
rare legitimate use of psexec from the locations mentioned above. this will require initial tuning based on your environment.
the rule doesn't look for anything suspicious so false positives are expected. if you use one of the tools mentioned, comment it out
unlikely
windows administrator tasks or troubleshooting
windows management scripts or software