heroui logo

Service DACL Modification via sc.exe

Elastic Detection Rules

View Source
Summary
The rule "Service DACL Modification via sc.exe" is designed to detect modifications to the Discretionary Access Control Lists (DACLs) of Windows services using the `sc.exe` command. Specifically, it identifies scenarios where `sc.exe` is invoked with the `sdset` argument, indicating that the DACLs are being altered to deny access to various user groups. By monitoring for this activity, the rule aims to uncover potential attempts at defense evasion made by adversaries aiming to manipulate service accessibility on Windows systems. The detection logic involves examining process creation events that detail the execution of `sc.exe`, ensuring the command includes patterns indicative of DACL changes. Notable user groups targeted for access denial include Interactive Users (IU), Service Users (SU), Built-in Administrators (BA), Local System (SY), and Users (WD). The associated risk score is medium (47), reflecting the significance of such activity in the context of maintaining security within Windows environments.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Application Log
  • Network Traffic
  • File
ATT&CK Techniques
  • T1564
  • T1543
  • T1543.003
Created: 2024-07-16