Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_disable_service.yml
T
Nasreddine Bencherchali b5c15c5137 More additions and updates
2022-08-10 12:52:49 +01:00

38 lines
1.2 KiB
YAML

title: Sc Or Set-Service Cmdlet Execution to Disable Services
id: 85c312b7-f44d-4a51-a024-d671c40b49fc
status: experimental
description: Detects when attackers use "sc.exe" or the powershell "Set-Service" cmdlet to change the startup type of a service to "disabled"
author: Nasreddine Bencherchali
references:
- https://www.virustotal.com/gui/file/38283b775552da8981452941ea74191aa0d203edd3f61fb2dee7b0aea3514955
date: 2022/08/01
logsource:
category: process_creation
product: windows
detection:
selection_sc_img:
- Image|endswith: '\sc.exe'
- OriginalFileName: 'sc.exe'
selection_sc_cli:
CommandLine|contains|all:
- ' config '
- 'start'
CommandLine|contains:
- 'disabled'
- 'demand'
selection_pwsh:
CommandLine|contains|all:
- 'Set-Service'
- '-StartupType'
CommandLine|contains:
- 'Disabled'
- 'Manual'
condition: all of selection_sc_* or selection_pwsh
falsepositives:
- Administrators settings a service to disable via script or cli for testing purposes
level: medium
tags:
- attack.execution
- attack.defense_evasion
- attack.t1562.001