
Summary
This detection rule identifies instances where the `sc.exe` utility is executed with command-line parameters to start a Windows Service on a remote host. The analytic harnesses data from Endpoint Detection and Response (EDR) agents, primarily focusing on the names of processes and their command-line executions. Engaging with the Service Control Manager (SCM) can signify lateral movement and an attempt at remote code execution by adversaries. Should it be established as malicious, it opens vulnerabilities that attackers might exploit to run arbitrary code on remote systems, leading to potential further compromises and persistent access in the network environment. By monitoring specified EDR logs, this rule proactively alerts security teams about suspicious service initiations that might align with nefarious activities.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1543
- T1543.003
Created: 2024-11-13