heroui logo

SCM Database Handle Failure

Sigma Rules

View Source
Summary
This detection rule focuses on identifying instances where non-system users attempt to access the Service Control Manager (SCM) database but fail to obtain a handle. The rule is relevant for monitoring unauthorized access attempts that could indicate malicious activity or reconnaissance efforts by attackers. The rule utilizes Windows Event ID 4656, which tracks attempted object access. Specifically, it looks for access attempts to the 'SC_MANAGER OBJECT' associated with the 'ServicesActive' object name, where the access mask indicates broader permissions ('0xf003f'). The rule excludes events initiated by system accounts (notably, the logon ID '0x3e4' is filtered out), which helps to minimize false positives and focus on potentially malicious behavior from non-system users. This is significant in detecting privilege escalation attempts or unauthorized service manipulations.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Logon Session
  • Process
Created: 2019-08-12