heroui logo

High Number of Process and/or Service Terminations

Elastic Detection Rules

View Source
Summary
This rule detects a potentially malicious activity characterized by a high volume of process terminations on Windows systems. Specifically, it monitors for cases where 10 or more processes are stopped, deleted, or suspended from the same host in a short timeframe, indicating possible attempts to disable critical services or processes that could support an attack, such as ransomware. The rule is implemented using a query that targets specific Windows processes known to manipulate services, filtered to avoid benign instances. Detailed investigation and remediation steps are included in the rule note, highlighting the need for incident response and proactive monitoring of affected accounts and processes.
Categories
  • Endpoint
  • Windows
  • On-Premise
  • Infrastructure
Data Sources
  • Windows Registry
  • Process
  • Application Log
ATT&CK Techniques
  • T1489
Created: 2020-12-03