Interesting Service Enumeration Via Sc.EXE

Detects the enumeration and query of interesting and in some cases sensitive services on the system via "sc.exe". Attackers often try to enumerate the services currently running on a system in order to find different attack vectors.

Sigma rule (View on GitHub)

 1title: Interesting Service Enumeration Via Sc.EXE
 2id: e83e8899-c9b2-483b-b355-5decc942b959
 3status: test
 4description: |
 5    Detects the enumeration and query of interesting and in some cases sensitive services on the system via "sc.exe".
 6    Attackers often try to enumerate the services currently running on a system in order to find different attack vectors.    
 7references:
 8    - https://www.n00py.io/2021/05/dumping-plaintext-rdp-credentials-from-svchost-exe/
 9    - https://pentestlab.blog/tag/svchost/
10author: Swachchhanda Shrawan Poudel
11date: 2024-02-12
12tags:
13    - attack.t1003
14    - attack.credential-access
15logsource:
16    product: windows
17    category: process_creation
18detection:
19    selection_img:
20        - Image|endswith: '\sc.exe'
21        - OriginalFileName: 'sc.exe'
22    selection_cli:
23        CommandLine|contains: 'query'
24    selection_cmd:
25        # Note: add more interesting services
26        CommandLine|contains: 'termservice'
27    condition: all of selection_*
28falsepositives:
29    - Unknown
30# Note: can be upgraded to medium after an initial baseline
31level: low

References

Related rules

to-top