
Summary
This detection rule is designed to identify instances where Windows services are being stopped using the "net" command-line utility. Specifically, it targets the processes related to "net.exe" and "net1.exe" which are both common tools for managing Windows services. The rule listens for process creation events and looks for command-line arguments that include the word 'stop', indicating an action to halt a specific service. This is relevant as malicious actors may stop services to disrupt operations or to evade detection by disabling services that may be monitoring their activities. The rule categorizes identified behavior as low-level risk, acknowledging that there are numerous legitimate use cases for stopping a Windows service. Therefore, users implementing this rule are advised to understand the context of the detected actions and filter out any legitimate administrative activities accordingly.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2023-03-05