Suspicious Windows Service Tampering

Detects the usage of binaries such as 'net', 'sc' or 'powershell' in order to stop, pause, disable or delete critical or important Windows services such as AV, Backup, etc. As seen being used in some ransomware scripts

Sigma rule (View on GitHub)

  1title: Suspicious Windows Service Tampering
  2id: ce72ef99-22f1-43d4-8695-419dcb5d9330
  3related:
  4    - id: eb87818d-db5d-49cc-a987-d5da331fbd90
  5      type: derived
  6    - id: 6783aa9e-0dc3-49d4-a94a-8b39c5fd700b
  7      type: obsolete
  8    - id: 7fd4bb39-12d0-45ab-bb36-cebabc73dc7b
  9      type: obsolete
 10status: test
 11description: |
 12        Detects the usage of binaries such as 'net', 'sc' or 'powershell' in order to stop, pause, disable or delete critical or important Windows services such as AV, Backup, etc. As seen being used in some ransomware scripts
 13references:
 14    - https://www.trendmicro.com/content/dam/trendmicro/global/en/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus/Genshin%20Impact%20Figure%2010.jpg
 15    - https://www.trellix.com/en-sg/about/newsroom/stories/threat-labs/lockergoga-ransomware-family-used-in-targeted-attacks.html
 16    - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md
 17    - https://research.nccgroup.com/2022/08/19/back-in-black-unlocking-a-lockbit-3-0-ransomware-attack/
 18    - https://www.virustotal.com/gui/file/38283b775552da8981452941ea74191aa0d203edd3f61fb2dee7b0aea3514955
 19author: Nasreddine Bencherchali (Nextron Systems), frack113 , X__Junior
 20date: 2022-09-01
 21modified: 2024-10-21
 22tags:
 23    - attack.defense-evasion
 24    - attack.t1489
 25logsource:
 26    category: process_creation
 27    product: windows
 28detection:
 29    selection_tools_img:
 30        - OriginalFileName:
 31              - 'net.exe'
 32              - 'net1.exe'
 33              - 'PowerShell.EXE'
 34              - 'psservice.exe'
 35              - 'pwsh.dll'
 36              - 'sc.exe'
 37        - Image|endswith:
 38              - '\net.exe'
 39              - '\net1.exe'
 40              - '\powershell.exe'
 41              - '\PsService.exe'
 42              - '\PsService64.exe'
 43              - '\pwsh.exe'
 44              - '\sc.exe'
 45    selection_tools_cli:
 46        - CommandLine|contains:
 47              - ' delete '
 48              - ' pause ' # Covers flags from: PsService and Sc.EXE
 49              - ' stop ' # Covers flags from: PsService.EXE, Net.EXE and Sc.EXE
 50              - 'Stop-Service '
 51              - 'Remove-Service '
 52        - CommandLine|contains|all:
 53              - 'config'
 54              - 'start=disabled'
 55    selection_services:
 56        CommandLine|contains:
 57            - '143Svc'
 58            - 'Acronis VSS Provider'
 59            - 'AcronisAgent'
 60            - 'AcrSch2Svc'
 61            - 'AdobeARMservice'
 62            - 'AHS Service'
 63            - 'Antivirus'
 64            - 'Apache4'
 65            - 'ARSM'
 66            - 'aswBcc'
 67            - 'AteraAgent'
 68            - 'Avast Business Console Client Antivirus Service'
 69            - 'avast! Antivirus'
 70            - 'AVG Antivirus'
 71            - 'avgAdminClient'
 72            - 'AvgAdminServer'
 73            - 'AVP1'
 74            - 'BackupExec'
 75            - 'bedbg'
 76            - 'BITS'
 77            - 'BrokerInfrastructure'
 78            - 'CASLicenceServer'
 79            - 'CASWebServer'
 80            - 'Client Agent 7.60'
 81            - 'Core Browsing Protection'
 82            - 'Core Mail Protection'
 83            - 'Core Scanning Server'
 84            - 'DCAgent'
 85            - 'dwmrcs'
 86            - 'EhttpSr'
 87            - 'ekrn'
 88            - 'Enterprise Client Service'
 89            - 'epag'
 90            - 'EPIntegrationService'
 91            - 'EPProtectedService'
 92            - 'EPRedline'
 93            - 'EPSecurityService'
 94            - 'EPUpdateService'
 95            - 'EraserSvc11710'
 96            - 'EsgShKernel'
 97            - 'ESHASRV'
 98            - 'FA_Scheduler'
 99            - 'FirebirdGuardianDefaultInstance'
100            - 'FirebirdServerDefaultInstance'
101            - 'FontCache3.0.0.0'
102            - 'HealthTLService'
103            - 'hmpalertsvc'
104            - 'HMS'
105            - 'HostControllerService'
106            - 'hvdsvc'
107            - 'IAStorDataMgrSvc'
108            - 'IBMHPS'
109            - 'ibmspsvc'
110            - 'IISAdmin'
111            - 'IMANSVC'
112            - 'IMAP4Svc'
113            - 'instance2'
114            - 'KAVFS'
115            - 'KAVFSGT'
116            - 'kavfsslp'
117            - 'KeyIso'
118            - 'klbackupdisk'
119            - 'klbackupflt'
120            - 'klflt'
121            - 'klhk'
122            - 'KLIF'
123            - 'klim6'
124            - 'klkbdflt'
125            - 'klmouflt'
126            - 'klnagent'
127            - 'klpd'
128            - 'kltap'
129            - 'KSDE1.0.0'
130            - 'LogProcessorService'
131            - 'M8EndpointAgent'
132            - 'macmnsvc'
133            - 'masvc'
134            - 'MBAMService'
135            - 'MBCloudEA'
136            - 'MBEndpointAgent'
137            - 'McAfeeDLPAgentService'
138            - 'McAfeeEngineService'
139            - 'MCAFEEEVENTPARSERSRV'
140            - 'McAfeeFramework'
141            - 'MCAFEETOMCATSRV530'
142            - 'McShield'
143            - 'McTaskManager'
144            - 'mfefire'
145            - 'mfemms'
146            - 'mfevto'
147            - 'mfevtp'
148            - 'mfewc'
149            - 'MMS'
150            - 'mozyprobackup'
151            - 'MSComplianceAudit'
152            - 'MSDTC'
153            - 'MsDtsServer'
154            - 'MSExchange'
155            - 'msftesq1SPROO'
156            - 'msftesql$PROD'
157            - 'msftesql$SQLEXPRESS'
158            - 'MSOLAP$SQL_2008'
159            - 'MSOLAP$SYSTEM_BGC'
160            - 'MSOLAP$TPS'
161            - 'MSOLAP$TPSAMA'
162            - 'MSOLAPSTPS'
163            - 'MSOLAPSTPSAMA'
164            - 'mssecflt'
165            - 'MSSQ!I.SPROFXENGAGEMEHT'
166            - 'MSSQ0SHAREPOINT'
167            - 'MSSQ0SOPHOS'
168            - 'MSSQL'
169            - 'MSSQLFDLauncher$'
170            - 'MySQL'
171            - 'NanoServiceMain'
172            - 'NetMsmqActivator'
173            - 'NetPipeActivator'
174            - 'netprofm'
175            - 'NetTcpActivator'
176            - 'NetTcpPortSharing'
177            - 'ntrtscan'
178            - 'nvspwmi'
179            - 'ofcservice'
180            - 'Online Protection System'
181            - 'OracleClientCache80'
182            - 'OracleDBConsole'
183            - 'OracleMTSRecoveryService'
184            - 'OracleOraDb11g_home1'
185            - 'OracleService'
186            - 'OracleVssWriter'
187            - 'osppsvc'
188            - 'PandaAetherAgent'
189            - 'PccNTUpd'
190            - 'PDVFSService'
191            - 'POP3Svc'
192            - 'postgresql-x64-9.4'
193            - 'POVFSService'
194            - 'PSUAService'
195            - 'Quick Update Service'
196            - 'RepairService'
197            - 'ReportServer'
198            - 'ReportServer$'
199            - 'RESvc'
200            - 'RpcEptMapper'
201            - 'sacsvr'
202            - 'SamSs'
203            - 'SAVAdminService'
204            - 'SAVService'
205            - 'ScSecSvc'
206            - 'SDRSVC'
207            - 'SearchExchangeTracing'
208            - 'sense'
209            - 'SentinelAgent'
210            - 'SentinelHelperService'
211            - 'SepMasterService'
212            - 'ShMonitor'
213            - 'Smcinst'
214            - 'SmcService'
215            - 'SMTPSvc'
216            - 'SNAC'
217            - 'SntpService'
218            - 'Sophos'
219            - 'SQ1SafeOLRService'
220            - 'SQL Backups'
221            - 'SQL Server'
222            - 'SQLAgent'
223            - 'SQLANYs_Sage_FAS_Fixed_Assets'
224            - 'SQLBrowser'
225            - 'SQLsafe'
226            - 'SQLSERVERAGENT'
227            - 'SQLTELEMETRY'
228            - 'SQLWriter'
229            - 'SSISTELEMETRY130'
230            - 'SstpSvc'
231            - 'storflt'
232            - 'svcGenericHost'
233            - 'swc_service'
234            - 'swi_filter'
235            - 'swi_service'
236            - 'swi_update'
237            - 'Symantec'
238            - 'TeamViewer'
239            - 'Telemetryserver'
240            - 'ThreatLockerService'
241            - 'TMBMServer'
242            - 'TmCCSF'
243            - 'TmFilter'
244            - 'TMiCRCScanService'
245            - 'tmlisten'
246            - 'TMLWCSService'
247            - 'TmPfw'
248            - 'TmPreFilter'
249            - 'TmProxy'
250            - 'TMSmartRelayService'
251            - 'tmusa'
252            - 'Tomcat'
253            - 'Trend Micro Deep Security Manager'
254            - 'TrueKey'
255            - 'UFNet'
256            - 'UI0Detect'
257            - 'UniFi'
258            - 'UTODetect'
259            - 'vds'
260            - 'Veeam'
261            - 'VeeamDeploySvc'
262            - 'Veritas System Recovery'
263            - 'vmic'
264            - 'VMTools'
265            - 'vmvss'
266            - 'VSApiNt'
267            - 'VSS'
268            - 'W3Svc'
269            - 'wbengine'
270            - 'WdNisSvc'
271            - 'WeanClOudSve'
272            - 'Weems JY'
273            - 'WinDefend'
274            - 'wmms'
275            - 'wozyprobackup'
276            - 'WPFFontCache_v0400'
277            - 'WRSVC'
278            - 'wsbexchange'
279            - 'WSearch'
280            - 'Zoolz 2 Service'
281    condition: all of selection_*
282falsepositives:
283    - Administrators or tools shutting down the services due to upgrade or removal purposes. If you experience some false positive, please consider adding filters to the parent process launching this command and not removing the entry
284level: high

References

Related rules

to-top