SigmaHQ/rules/windows/process_creation/win_susp_service_dacl_modification.yml
2020-10-16 11:57:54 -03:00

34 lines
929 B
YAML

title: Suspicious Service DACL Modification
id: 99cf1e02-00fb-4c0d-8375-563f978dfd37
description: Detects suspicious DACL modifications that can be used to hide services or make them unstopable
author: Jonhnathan Ribeiro, oscd.community
status: experimental
date: 2020/10/16
references:
- https://www.sans.org/blog/red-team-tactics-hiding-windows-services/
- https://docs.microsoft.com/pt-br/windows/win32/secauthz/sid-strings
tags:
- attack.persistence
- attack.t1543.003
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith:
- '\sc.exe'
CommandLine|contains|all:
- 'sdset'
- 'D;;'
sids:
CommandLine|contains:
- ';;;IU'
- ';;;SU'
- ';;;BA'
- ';;;SY'
- ';;;WD'
condition: selection and sids
falsepositives:
- Unknown
level: high