
Summary
The detection rule 'Deny Service Access Using Security Descriptor Tampering Via sc.EXE' aims to identify malicious attempts to modify the Discretionary Access Control List (DACL) of Windows services using the 'sc.exe' command-line tool. This technique can restrict access to critical services, leading to scenarios where these services may become invisible to the end-user or remain running endlessly due to unauthorized access restrictions. The rule focuses on monitoring process creation events related to sc.exe, specifically looking for command lines indicative of DACL manipulation (e.g., using 'sdset' with certain access rights defined). By triggering alerts for such activities, the system can help administrators detect and mitigate potential privilege escalation attacks or service persistence methods leveraged by malicious actors. Key components include examining command line arguments for keywords associated with setting security descriptors, checking for alterations made against specific trusted accounts, and ensuring that all given selection criteria are met before triggering a detection. Overall, this rule plays a crucial role in safeguarding critical Windows services against unauthorized access modifications.
Categories
- Windows
- Endpoint
- Infrastructure
Data Sources
- Process
- Command
Created: 2020-10-16