Possible worm activity
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
A new service is installed on a series of Windows devices within a short timeframe.
Severity
Critical
Rule Requirement
Criteria
Action1:
actionname = "Service installed"
| timewindow 15m
| groupby SERVICENAME having COUNT >= 5
select Action1.timewindow.HOSTNAME,Action1.timewindow.MESSAGE,Action1.timewindow.DOMAIN,Action1.timewindow.SERVICEACCOUNT,Action1.timewindow.SERVICENAME,Action1.timewindow.OBJECTNAME,Action1.timewindow.USERNAME,Action1.timewindow.SECURITYID,Action1.timewindow.SERVICESTARTUPTYPE,Action1.timewindow.SERVICETYPE
Detection
Execution Mode
realtime
Log Sources
Windows


