
Summary
The Excessive Service Stop Attempt detection rule identifies potentially malicious behavior by monitoring multiple attempts to stop or delete system services using common command-line tools such as `net.exe`, `sc.exe`, and `net1.exe`. This rule is based on logs generated by Endpoint Detection and Response (EDR) agents, which capture significant process activity and command-line executions. The detection focuses on identifying instances where there are five or more service stop/delete attempts within a one-minute interval, which could indicate a threat actor's attempt to disable security services or critical operational components. As this rule is now deprecated, it is recommended to consider newer detection methods that may have replaced this functionality. Users should also review incidents of confirmed malicious activity to understand the implications of such service manipulation on the integrity of the affected endpoints.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Script
ATT&CK Techniques
- T1489
Created: 2025-01-24