This research paper explains how to take advantage of windows services, how to mimic display names to deploy malicious beacons or even Meterpreter sessions.
You can download it from the following link: https://packetstormsecurity.com/files/download/163120/windows-smuggling.pdf
Source: https://packetstormsecurity.com/files/163120/Smuggling-Via-Windows-Services-Display-Name-Lateral-Movement.html

