
Summary
This detection rule identifies the deletion of a Windows service from the registry, specifically tracking changes within the CurrentControlSet\Services path. It utilizes Sysmon Event ID 12 and 13 data, focusing on registry activities that involve the deletion action or modification of a DeleteFlag. This behavior is critical as attackers often remove services to evade detection, obstruct responses, and maintain a stealthy presence in the environment. If detected, such activity can lead to compromised system integrity and functionality, making it imperative for security teams to monitor these changes vigilantly and investigate any anomalies promptly.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1489
Created: 2024-11-13