
Summary
This threat detection rule is focused on identifying malicious attempts to stop services on Windows endpoints, which could be part of an adversary's strategy to disrupt legitimate operations. The rule highlights the potential risks posed by stopping or disabling critical services, such as Microsoft Exchange, which could render essential business functions inoperable. It emphasizes the behavior of threat actors who may look to halt services to facilitate further attacks or disrupt incident response efforts, such as data destruction or encryption attacks against significant services like Exchange Server and SQL databases. The rule incorporates detection through a series of event codes associated with service stop commands and leverages Splunk queries to monitor relevant activities associated with malicious service interruption tactics.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Logon Session
ATT&CK Techniques
- T1489
- T1562.001
Created: 2024-02-09