heroui logo

Service Stop Commands

Anvilogic Forge

View Source
Summary
The detection rule titled "Service Stop Commands" targets adversaries who may attempt to stop or disable critical services within a system, potentially impacting legitimate user operations and incident response activities. Malicious actors aim to render essential services unavailable, facilitating further unauthorized actions or damage within the environment. The rule is particularly relevant to noted threat actors such as APT29, FIN6, and Lazarus, who utilize tactics associated with service interruption. The rule logic is crafted for use with Splunk, utilizing commands to retrieve endpoint data and identifying instances where critical services undergo stopping operations through various commands such as 'sc.exe', 'net', and 'taskkill'. Furthermore, the rule extracts relevant process attributes to provide detailed analysis regarding the user and service being manipulated. The implications of stopping services underscore the importance of monitoring for such command usage, reinforcing the defensive posture against potential exploitation.
Categories
  • Endpoint
  • Windows
  • Cloud
Data Sources
  • Process
  • Script
  • Application Log
ATT&CK Techniques
  • T1489
  • T1562.001
Created: 2024-02-09