heroui logo

Stop Windows Service Via PowerShell Stop-Service

Sigma Rules

View Source
Summary
This rule detects the execution of the PowerShell Cmdlet 'Stop-Service', which is often used to halt Windows services. Stopping a service can be a legitimate administrative task; however, it may also indicate malicious activity such as an attacker attempting to disrupt critical system functions. The detection works by monitoring process creation events and filtering based on the originating command line of PowerShell instances. The rule specifically identifies the use of executable names associated with PowerShell and the presence of 'Stop-Service' in the command line arguments. Given the potential for both legitimate and malicious intent in stopping services, it is crucial to analyze context and motor legitimate administrative activities accordingly. The false positive rate is low owing to the nature of technology, yet organizations should still anticipate and filter natural administrative activities, personal user privileges, and context-dependent factors to fine-tune detection effectiveness.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2023-03-05