heroui logo

Attempt To Stop Security Service

Splunk Security Content

View Source
Summary
The rule "Attempt To Stop Security Service" aims to detect malicious activity related to disabling security services on endpoints, specifically by identifying the invocation of the "sc.exe" command with the "stop" parameter through data gathered by Endpoint Detection and Response (EDR) agents. This activity is considered significant because stopping security services could open the door for unauthorized access and potential data breaches. The analytic utilizes Sysmon EventID data, Windows Event Log Security, and CrowdStrike Process data to monitor for suspicious process behavior that indicates an effort to undermine endpoint security protocols. Although this analytic has been deprecated, it underscores the importance of monitoring actions that could compromise an organization's overall security posture and calls for immediate investigation if confirmed as malicious.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1562.001
  • T1562
Created: 2025-01-24