
Summary
The detection rule 'Windows Excessive Service Stop Attempt' is designed to identify abnormal patterns of activity that may indicate a malicious attempt to disable critical system services on Windows endpoints. This rule focuses on the monitoring of command-line executions specifically related to 'net.exe' and 'sc.exe', tools commonly used for service management in Windows environments. The analytic leverages telemetry from Endpoint Detection and Response (EDR) solutions, collecting data related to process names, command-line arguments, and execution times. By analyzing this data, the rule seeks to detect instances where there are excessive attempts (five or more within a one-minute window) to either stop or delete services. Such behaviors can signify an adversary's efforts to disable security mechanisms or essential services, enabling them to maintain persistence or elevate privileges after gaining access to the system. The rule uses Sysmon EventID 1, Windows Event Log Security 4688, and CrowdStrike ProcessRollup2 data sources for its analysis, providing a robust detection mechanism to enhance endpoint security against potential threats.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1489
Created: 2025-01-13