Stop Windows Service Via Sc.EXE
Detects the stopping of a Windows service via the "sc.exe" utility
Sigma rule (View on GitHub)
1title: Stop Windows Service Via Sc.EXE
2id: 81bcb81b-5b1f-474b-b373-52c871aaa7b1
3related:
4 - id: eb87818d-db5d-49cc-a987-d5da331fbd90
5 type: obsolete
6status: test
7description: Detects the stopping of a Windows service via the "sc.exe" utility
8references:
9 - https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc742107(v=ws.11)
10author: Jakob Weinzettl, oscd.community, Nasreddine Bencherchali (Nextron Systems)
11date: 2023-03-05
12modified: 2024-01-18
13tags:
14 - attack.impact
15 - attack.t1489
16logsource:
17 category: process_creation
18 product: windows
19detection:
20 selection_img:
21 - OriginalFileName: 'sc.exe'
22 - Image|endswith: '\sc.exe'
23 selection_cli:
24 CommandLine|contains: ' stop '
25 condition: all of selection_*
26falsepositives:
27 - There are many legitimate reasons to stop a service. This rule isn't looking for any suspicious behavior in particular. Filter legitimate activity accordingly
28level: low
29regression_tests_path: regression_data/rules/windows/process_creation/proc_creation_win_sc_stop_service/info.yml
References
Related rules
- Suspicious Windows Service Tampering
- Azure Container Registry Created or Deleted
- Azure Kubernetes Cluster Created or Deleted
- Azure Kubernetes Network Policy Change
- Azure Kubernetes RoleBinding/ClusterRoleBinding Modified and Deleted