
Summary
This detection rule identifies the suspicious termination of essential Windows services related to Cisco's Secure Endpoint, which often signifies a precursor to ransomware attacks. The rule monitors Windows System Event Logs (EventCode 7036) for events where critical services, such as those employed by Cisco's security solutions, are stopped. Ransomware typically disables these services to eliminate obstacles during the encryption of files. By capturing these stoppages early, organizations can take preventive measures before potential data loss occurs. The log data must include information from EventID 7036, indicating service state changes, and focuses particularly on services associated with Cisco's endpoint protection. The rule also includes alert definitions to notify owners about the paused services, creating a prompt response mechanism to analyze and potentially mitigate the threat. Despite being a solid anomaly detection framework, it is essential to also consider known false positives that can occur during legitimate administrative activities, necessitating further investigation into the actions leading to service stoppage.
Categories
- Endpoint
Data Sources
- Windows Registry
ATT&CK Techniques
- T1490
- T1562.001
Created: 2024-12-09