
Summary
This threat detection rule identifies suspicious termination of known services that are often targeted by ransomware before they proceed to encrypt files. It uses Windows System Event Logs, specifically monitoring for EventCode 7036, which notifies when critical services related to backups and security (such as Volume Shadow Copy, backup software services, and antivirus services) are stopped. The importance of this detection lies in the fact that ransomware typically stops these services to disable backups and antivirus functions, facilitating the file encryption process without hindrance. This behavior, if confirmed as malicious, could result in serious operational disruptions and significant data loss.
Categories
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1490
Created: 2024-12-10