Interesting Service Enumeration Via Sc.EXE

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects the enumeration and query of interesting and in some cases sensitive services on the system via "sc.exe". Attackers often try to enumerate the services currently running on a system in order to find different attack vectors.

Severity

Attention

Rule Requirement

Criteria

Action1: actionname = "Process started" AND (PROCESSNAME endswith "\sc.exe" OR ORIGINALFILENAME = "sc.exe") AND COMMANDLINE contains "query" AND COMMANDLINE contains "termservice" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Swachchhanda Shrawan Poudel