Suspicious Service Installed

Last updated on:

About the rule

Rule Type

Advanced

Rule Description

Detects installation of NalDrv or PROCEXP152 services via registry-keys to non-system32 folders. Both services are used in the tool Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs), which uses KDU (https://github.com/hfiref0x/KDU)

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "null" | timewindow 10m | groupby HOSTNAME | groupby USERNAME having COUNT > 5 Action2: actionname = "Successful logon" AND HOSTNAME = Action1.HOSTNAME AND USERNAME = Action1.USERNAME Action3: actionname = "null" AND HOSTNAME = Action1.HOSTNAME AND USERNAME = Action1.USERNAME Action4: actionname = "null" AND SERVICENAME = Action3.SERVICENAME AND HOSTNAME = Action1.HOSTNAME sequence:Action1 followedby Action2 within 2m followedby Action3 within 15m followedby Action4 within 15m select Action2.HOSTNAME,Action2.MESSAGE,Action2.USERNAME,Action2.DOMAIN,Action2.REMOTEHOST,Action2.REMOTEIP,Action2.LOGONTYPE,Action2.PROCESSNAME,,

Detection

Execution Mode

realtime

Log Sources

Windows

Author

xknow (@xknow_infosec), xorxes (@xor_xes)