Files
blue-team-tools/rules/windows/process_creation/win_susp_service_dacl_modification.yml
T
2021-11-27 11:33:14 +01:00

35 lines
862 B
YAML

title: Suspicious Service DACL Modification
id: 99cf1e02-00fb-4c0d-8375-563f978dfd37
status: test
description: Detects suspicious DACL modifications that can be used to hide services or make them unstopable
author: Jonhnathan Ribeiro, oscd.community
references:
- https://www.sans.org/blog/red-team-tactics-hiding-windows-services/
- https://docs.microsoft.com/pt-br/windows/win32/secauthz/sid-strings
date: 2020/10/16
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith:
- '\sc.exe'
CommandLine|contains|all:
- 'sdset'
- 'D;;'
sids:
CommandLine|contains:
- ';;;IU'
- ';;;SU'
- ';;;BA'
- ';;;SY'
- ';;;WD'
condition: selection and sids
falsepositives:
- Unknown
level: high
tags:
- attack.persistence
- attack.t1543.003