heroui logo

Windows Security Account Manager Stopped

Splunk Security Content

View Source
Summary
This detection rule identifies the stopping of the Windows Security Account Manager (SAM) service, which is crucial for Windows authentication. The rule specifically looks for instances where the command 'net stop samss' is executed via command-line, utilizing telemetry from Endpoint Detection and Response (EDR) tools such as Sysmon and Windows Event Logs. Stopping the SAM service can lead to significant security ramifications, such as bypassing authentication, privilege escalation, and may be indicative of malicious activities such as ransomware attacks, notably Ryuk. The implementation requires appropriate logging of process activities and command-line executions, coupled with integration into the Splunk data model to maintain effectiveness and reduce false positives.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1489
Created: 2024-12-10