diff --git a/atomics/T1489/T1489.md b/atomics/T1489/T1489.md index 65edaacb..7bad1883 100644 --- a/atomics/T1489/T1489.md +++ b/atomics/T1489/T1489.md @@ -32,6 +32,10 @@ sc.exe stop #{service_name} ``` +#### Cleanup Commands: +``` +sc.exe start #{service_name} +```

@@ -53,6 +57,10 @@ net.exe stop #{service_name} ``` +#### Cleanup Commands: +``` +net.exe start #{service_name} +```

@@ -67,7 +75,7 @@ This technique was used by WannaCry. #### Inputs | Name | Description | Type | Default Value | |------|-------------|------|---------------| -| process_name | Name of a process to kill | String | sqlwriter.exe| +| process_name | Name of a process to kill | String | spoolsv.exe| #### Run it with `command_prompt`! ``` diff --git a/atomics/index.yaml b/atomics/index.yaml index 829c5021..a1c16a0f 100644 --- a/atomics/index.yaml +++ b/atomics/index.yaml @@ -14026,6 +14026,9 @@ impact: elevation_required: true command: 'sc.exe stop #{service_name} +' + cleanup_command: 'sc.exe start #{service_name} + ' - name: Windows - Stop service using net.exe description: 'Stops a specified service using the net.exe command. @@ -14043,6 +14046,9 @@ impact: elevation_required: true command: 'net.exe stop #{service_name} +' + cleanup_command: 'net.exe start #{service_name} + ' - name: Windows - Stop service by killing process description: "Stops a specified service killng the service's process. \nThis @@ -14053,7 +14059,7 @@ impact: process_name: description: Name of a process to kill type: String - default: sqlwriter.exe + default: spoolsv.exe executor: name: command_prompt elevation_required: false