
Summary
This rule is designed to detect attempts at enumerating interesting and potentially sensitive Windows services using the "sc.exe" command-line utility. Attackers often utilize such enumerations to discover vulnerable services that could be exploited for further actions such as privilege escalation or lateral movement. Notably, this detection focuses on process creation events from the Windows operating system, particularly when the sc.exe tool is invoked in contexts likely indicating malicious activity. The rule conditions specify looking for instances where sc.exe is used to query services and involves sensitive services like 'termservice'. This information can help security teams quickly identify and respond to potentially harmful actions on their systems.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2024-02-12