heroui logo

Excessive Attempt To Disable Services

Splunk Security Content

View Source
Summary
The rule 'Excessive Attempt To Disable Services' detects potential malicious activity related to disabling critical services on Windows-based endpoints. It focuses specifically on instances where the 'sc.exe' command is executed with certain parameters that suggest an attempt to modify service configurations (e.g., setting services to 'Disabled'). The detection logic binds to data sourced from Endpoint Detection and Response (EDR) agents, analyzing process logs to identify when 'sc.exe' is called in quick succession (four or more times within one minute) with these specific commands. This behavior could indicate an adversarial effort to disable security services or other important functionalities as a precursor to further attacks, enabling persistence, evasion of detection, or similar actions. Mitigating measures and investigation follow-ups can be conducted based on the generated alerts.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Script
  • Application Log
ATT&CK Techniques
  • T1489
Created: 2024-11-13