
Summary
The rule named 'Service Command Lateral Movement' is designed to detect the use of 'sc.exe' for creating, modifying, or starting services on remote Windows hosts, potentially indicating lateral movement by an adversary. By monitoring for suspicious invocations of 'sc.exe', this rule differentiates between legitimate administrative activities and malicious actions. The rule employs a sequence query to identify commands which target remote systems, checking for specific arguments like 'create', 'config', or 'start' in relation to service management. The designed EQL query accounts for various logs originating from endpoint events, network communications, and Sysmon operations. Given the noisy nature of such actions, especially by legitimate users, the rule includes guidance for triage and investigation, noting the importance of context when analyzing alerts for true threats. The rule also incorporates possible false positive scenarios stemming from standard administrative tasks and recommends steps for incident response and remediation, such as isolating affected systems and reviewing associated user accounts.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Network Traffic
- Windows Registry
- Application Log
ATT&CK Techniques
- T1021
- T1543
- T1543.003
- T1569
- T1569.002
Created: 2020-09-02