Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_service_stop.yml
T

34 lines
959 B
YAML
Raw Normal View History

2020-02-20 23:00:16 +01:00
title: Stop Windows Service
2019-12-19 23:56:36 +01:00
id: eb87818d-db5d-49cc-a987-d5da331fbd90
2019-10-23 11:22:09 -07:00
description: Detects a windows service to be stopped
status: experimental
author: Jakob Weinzettl, oscd.community
date: 2019/10/23
modified: 2021/11/30
2019-10-23 11:22:09 -07:00
tags:
- attack.impact
- attack.t1489
2020-01-19 22:34:16 +01:00
logsource:
category: process_creation
product: windows
2019-10-23 11:22:09 -07:00
detection:
2019-11-08 02:40:37 +03:00
selection:
2021-08-14 09:54:27 +02:00
Image|endswith:
2019-11-08 02:40:37 +03:00
- '\sc.exe'
- '\net.exe'
- '\net1.exe'
CommandLine|contains: 'stop'
filter:
CommandLine: 'sc stop KSCWebConsoleMessageQueue' # kaspersky Security Center Web Console double space between sc and stop
User|startswith:
- 'NT AUTHORITY\SYSTEM'
- 'AUTORITE NT\Sys' # French language settings
condition: selection and not filter
2020-01-11 00:11:27 +01:00
fields:
- ComputerName
- User
- CommandLine
2019-10-23 11:22:09 -07:00
falsepositives:
- Administrator shutting down the service due to upgrade or removal purposes
level: low