Windows services execute in the background, typically during the boot process, and often run with the highest system privileges (NT AUTHORITY\SYSTEM). This makes them the holy grail for attacker persistence and lateral movement execution.
Event ID 7045 (“A service was installed in the system”) is generated in the System log whenever a new service is registered with the Service Control Manager (SCM).
Parsing an Event 7045 record yields critical forensic artifacts:
Service Name: The name assigned to the service. Attackers often use typosquatting to mimic legitimate services (e.g., WinDefendSvc instead of WinDefend).
Service File Name (Critical): The absolute file path of the executable that the service will launch.
Red Flag: A path pointing to a world-writable directory like C:\Users\Public\, C:\PerfLogs\, or a temporary folder (%TEMP%).
Service Account: The account context under which the service executes (usually LocalSystem).
2. Scheduled Tasks: The Most Common Persistence (Event 4698)
Scheduled tasks allow an adversary to execute a program at a specific time, on a recurring interval, or triggered by a specific system event (like user logon). It is a highly popular, native “Living off the Land” persistence mechanism.
Event ID 4698 (“A scheduled task was created”) is generated in the Security log.
Unlike Service Creation, Event 4698 is not logged by default. To capture this vital telemetry, administrators must enable the specific audit policy via GPO:
Advanced Audit Policy Configuration > Object Access > Audit Other Object Access Events (Set to Success).
Command / Action: The exact script or binary executed by the task. Analysts must look for tasks invoking powershell.exe, cmd.exe, wscript.exe, or mshta.exe passing obfuscated parameters (e.g., Base64 encoded payloads).
Author: The user account that created the task. A compromised standard user creating tasks running as SYSTEM indicates a privilege escalation exploit has occurred.
3. Account and Group Manipulation: Privilege Escalation
Threat actors frequently create “backdoor accounts” or add existing compromised accounts to highly privileged groups to maintain administrative access.
Account Creation (Event 4720)
A user account was created.
Look for accounts created with names mimicking IT staff (e.g., sysadmin, backup_svc, temp_admin). The Subject field reveals which compromised account was used to execute the net user command.
Group Manipulation (Events 4728, 4732, 4756)
A member was added to a security-enabled group.
These events track additions to Global, Local, and Universal groups. The most critical alerts occur when an adversary adds a user to the Administrators, Domain Admins, or Remote Desktop Users groups, securing total system dominance.