
Summary
This detection rule is designed to identify attempts to terminate the Symantec Endpoint Protection (SEP) service, specifically targeting the process 'ccSvcHst.exe'. The rule recognizes when the Windows command 'taskkill' is invoked with the parameters '/F' for forced termination and '/IM' indicating the image name of the running process. As described in the associated documentation, this can be exploited by the NT AUTHORITY/SYSTEM account due to improper security configurations in the Symantec Endpoint Protection software. If successful, this could potentially disable antivirus protections, leaving the system vulnerable to attacks. The detection is classified under high severity, indicative of the risk associated with disabling a critical security service.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-09-13