
Summary
This detection rule identifies instances where the Windows Service Control (sc.exe) command is invoked from script interpreter processes such as PowerShell, WMI, or command-line shells. It is designed to highlight potential privilege escalation or persistence techniques employed by attackers. By tracking service creation, modification, or management operations initiated by non-system user accounts, the rule aims to detect malicious activities that leverage service manipulation for unauthorized actions. Investigations may involve checking service configurations, verifying user permissions, and analyzing execution chains to confirm the legitimacy of the actions and ensure they are not part of an attack vector. This approach helps in identifying potentially compromised accounts or systems and taking appropriate remedial actions.
Categories
- Windows
- Endpoint
- Identity Management
Data Sources
- Process
- Windows Registry
- Application Log
- File
- Service
ATT&CK Techniques
- T1543
- T1543.003
- T1047
- T1059
- T1059.001
- T1059.003
- T1059.005
- T1218
- T1218.010
- T1218.011
Created: 2020-02-18