IMPORTANT: No additional bug fixes or documentation updates
will be released for this version. For the latest information, see the
current release documentation.
Persistence via Update Orchestrator Service Hijack
editPersistence via Update Orchestrator Service Hijack
editIdentifies potential hijacking of the Microsoft Update Orchestrator Service to establish persistence with an integrity level of SYSTEM.
Rule type: eql
Rule indices:
- winlogbeat-*
- logs-endpoint.events.*
- logs-windows.*
Severity: high
Risk score: 73
Runs every: 5 minutes
Searches indices from: now-9m (Date Math format, see also Additional look-back time
)
Maximum alerts per execution: 100
References:
Tags:
- Elastic
- Host
- Windows
- Threat Detection
- Persistence
- CVE-2020-1313
Version: 7 (version history)
Added (Elastic Stack release): 7.10.0
Last modified (Elastic Stack release): 8.4.0
Rule authors: Elastic
Rule license: Elastic License v2
Investigation guide
editRule query
editprocess where event.type == "start" and process.parent.executable : "C:\\Windows\\System32\\svchost.exe" and process.parent.args : "UsoSvc" and not process.executable : ("?:\\ProgramData\\M icrosoft\\Windows\\UUS\\Packages\\*\\amd64\\MoUsoCoreWorker.exe", "?:\\Windows\\System32\\UsoClient.exe", "?:\\Windows\\System32\\MusNotification.exe", "?:\\Windows\\System32\\MusNotificationUx.exe", "?:\\Windows\\System32\\MusNotifyIcon.exe", "?:\\Windows\\System32\\WerFault.exe", "?:\\Windows\\System32\\WerMgr.exe", "?:\\Windows\\UUS\\amd64\\MoUsoCoreWorker.exe", "?:\\Windows\\System32\\MoUsoCoreWorker.exe", "?:\\Windows\\UUS\\amd64\\UsoCoreWorker.exe", "?:\\Windows\\System32\\UsoCoreWorker.exe", "?:\\Program Files\\Common Files\\microsoft shared\\ClickToRun\\OfficeC2RClient.exe")
Threat mapping
editFramework: MITRE ATT&CKTM
-
Tactic:
- Name: Persistence
- ID: TA0003
- Reference URL: https://attack.mitre.org/tactics/TA0003/
-
Technique:
- Name: Create or Modify System Process
- ID: T1543
- Reference URL: https://attack.mitre.org/techniques/T1543/
Rule version history
edit- Version 7 (8.4.0 release)
-
-
Updated query, changed from:
process where event.type == "start" and process.parent.executable : "C:\\Windows\\System32\\svchost.exe" and process.parent.args : "UsoSvc" and not process.executable : ( "C:\\Windows\\System32\\UsoClient.exe", "C:\\Windows\\System32\\MusNotification.exe", "C:\\Windows\\System32\\MusNotificationUx.exe", "C:\\Windows\\System32\\MusNotifyIcon.exe", "C:\\Windows\\System32\\WerFault.exe", "C:\\Windows\\System32\\WerMgr.exe" )
-
- Version 5 (8.2.0 release)
-
- Formatting only
- Version 4 (7.12.0 release)
-
-
Updated query, changed from:
event.category:process and event.type:(start or process_started) and process.parent.name:svchost.exe and process.parent.args:(UsoSvc or usosvc) and not process.name:(UsoClient.exe or usoclient.exe or MusNotification.exe or musnotification.exe or MusNotificationUx.exe or musnotificationux.exe)
-
- Version 3 (7.11.2 release)
-
- Formatting only
- Version 2 (7.11.0 release)
-
- Formatting only