
Summary
This detection rule identifies potentially malicious activity involving the `sfc.exe` utility, which is part of Cisco Secure Endpoint installation. It specifically targets scenarios where `sfc.exe` is executed with the `-k` parameter, indicating an attempt to stop the Immunet Protect service. Such actions may signify an attempt to disable security defenses on the endpoint, leading to increased risk of compromise and lateral movements by attackers within the network. The detection utilizes telemetry data from Sysmon Event ID 1, Windows Event Log Security 4688, and CrowdStrike ProcessRollup2 to monitor command-line executions. Responses to this detection should focus on validating whether the activity is legitimate or part of a malicious tampering attempt.
Categories
- Endpoint
Data Sources
- Process
- Windows Registry
- Image
ATT&CK Techniques
- T1562.001
Created: 2025-02-19