heroui logo

Windows Excessive Disabled Services Event

Splunk Security Content

View Source
Summary
The 'Windows Excessive Disabled Services Event' rule identifies potential malicious activity by monitoring Windows Event Logs for an excessive number of service state changes, specifically where services are changed from 'start' to 'disabled'. This behavior may suggest an attacker is attempting to disable security mechanisms or critical system services, which could lead to defense evasion or system disruption. The specified detection leverages EventCode 7040 from the Windows Event Log, analyzing system events where these alterations occur across a single host. The rule aggregates events and triggers when the count of disable actions exceeds a threshold of ten within a given timeframe. This detection is critical for early identification of adversarial actions that could compromise system integrity and safety.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1562.001
  • T1562
Created: 2024-12-10