Files
atomic-red-team/atomics/T1489/T1489.yaml
T
Carrie Roberts 1bfefdacfc Add elevated (#542)
* provide elevation_required attribute

* provide elevation_required attribute

* provide elevation_required attribute
2019-09-03 07:34:42 -06:00

63 lines
1.3 KiB
YAML

---
attack_technique: T1489
display_name: Service Stop
atomic_tests:
- name: Windows - Stop service using Service Controller
description: |
Stops a specified service using the sc.exe command.
supported_platforms:
- windows
input_arguments:
service_name:
description: Name of a service to stop
type: String
default: spooler
executor:
name: command_prompt
elevation_required: true
command: |
sc.exe stop #{service_name}
- name: Windows - Stop service using net.exe
description: |
Stops a specified service using the net.exe command.
supported_platforms:
- windows
input_arguments:
service_name:
description: Name of a service to stop
type: String
default: spooler
executor:
name: command_prompt
elevation_required: true
command: |
net.exe stop #{service_name}
- name: Windows - Stop service by killing process
description: |
Stops a specified service killng the service's process.
This technique was used by WannaCry.
supported_platforms:
- windows
input_arguments:
process_name:
description: Name of a process to kill
type: String
default: sqlwriter.exe
executor:
name: command_prompt
elevation_required: false
command: |
taskkill.exe /f /im #{process_name}