heroui logo

Start Windows Service Via Net.EXE

Sigma Rules

View Source
Summary
This detection rule identifies the execution of the Windows command-line utility 'net.exe', specifically targeting instances where it is used to start services using the 'start' flag. By monitoring the command-line arguments passed to the utility, the rule isolates cases where an admin or user invokes this command, which can be a potential indicator of malicious behavior, especially if such actions are performed in an unexpected context. The rule focuses on the relevant parameters, checking for the presence of the command while ensuring that the command is executed from associated file paths like 'net.exe' or 'net1.exe'. False positives may occur in legitimate administrative scenarios, so careful analysis of the context and details surrounding the detection is recommended.
Categories
  • Windows
Data Sources
  • Process
ATT&CK Techniques
  • T1569.002
Created: 2019-10-21