
Summary
This detection rule is designed to identify potential security risks associated with the misuse of the Service Control (sc.exe) tool to modify the Discretionary Access Control List (DACL) of Windows services. By altering the DACL, an attacker can grant unauthorized access to services from suspicious user accounts or trustees, bypassing existing access controls. The detection mechanism focuses on monitoring the execution of the 'sc.exe' command with specific parameters that indicate an attempt to set security descriptors (using 'sdset') and the involvement of suspicious trustees (e.g., Interactive Users, System Users, Built-in Administrators). By analyzing the command line arguments and the processes being executed, this rule helps mitigate the risk of privilege escalation and unauthorized changes to system services.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Windows Registry
Created: 2023-02-28