heroui logo

Windows System Reboot CommandLine

Splunk Security Content

View Source
Summary
This detection rule identifies the execution of the Windows command line tool 'shutdown.exe' with specific parameters designed for rebooting a system. It analyzes data collected from Endpoint Detection and Response (EDR) agents, observing particular process names and command-line arguments that may indicate malicious intent. The nature of this activity is critical, as it is frequently employed by advanced persistent threats (APTs) and remote access trojans (RATs), such as dcrat, to disrupt operations, cause system destruction, or hinder recovery efforts by forcing a reboot of the host machine. The rule's detection capabilities aim to minimize potential risks associated with unauthorized system reboots that could lead to system downtime, data loss, and decreased effectiveness in incident response.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1529
Created: 2024-11-13