First Time Seen Running Windows Service

Description

This search looks for the first and last time a Windows service is seen running in your environment. This table is then cached.

Content Mapping

This content is not mapped to any local saved search. Add mapping


Use Case

Security Monitoring

Category

Malware

Alert Volume

This search looks for the first and last time a Windows service is seen running in your environment. This table is then cached.

SPL Difficulty

None

Journey

Stage 1

MITRE ATT&CK Tactics

Execution

MITRE ATT&CK Techniques

System Services

Service Execution

MITRE Threat Groups

APT32
APT39
APT41
Blue Mockingbird
FIN6
Honeybee
Ke3chang
Silence
Wizard Spider

Kill Chain Phases

Installation
Actions On Objectives

Data Sources

Windows Security

   Help

First Time Seen Running Windows Service Help

While this search does not require you to adhere to Splunk CIM, you must be ingesting your Windows system event logs in order for this search to execute successfully. You should run the baseline search Previously Seen Running Windows Services - Initial to build the initial table of child processes and hostnames for this search to work. You should also schedule at the same interval as this search the second baseline search Previously Seen Running Windows Services - Update to keep this table up to date and to age out old Windows Services. Please update the previously_seen_windows_service_window macro to adjust the time window. Please ensure that the Splunk Add-on for Microsoft Windows is version 8.0.0 or above.

   Search

Open in Search