
Summary
This detection rule aims to identify attempts to stop critical Windows services using common command-line utilities like `net.exe`, `sc.exe`, or the PowerShell `Stop-Service` cmdlet. Such actions can be indicative of malicious behavior, as attackers often try to disable security services to prevent detection during their operations, such as deploying ransomware or other forms of compromise. The detection mechanism relies on telemetry data collected from Endpoint Detection and Response (EDR) solutions, which capture relevant process creation events that signal service termination commands. Detection effectiveness is contingent on the proper ingestion and normalization of EDR logs using the Splunk Common Information Model (CIM). The rule includes known false positives linked to legitimate Windows updates or service restarts, as these can also trigger similar events. To strengthen detection capabilities, integration with the MITRE ATT&CK framework highlights potential associated attack tactics, specifically under T1489, which pertains to data destruction activities.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Application Log
ATT&CK Techniques
- T1489
Created: 2025-01-13