Detection rules › Sigma

Interesting Service Enumeration Via Sc.EXE

Severity
low
Author
Swachchhanda Shrawan Poudel
Source
upstream

Detects the enumeration and query of interesting and in some cases sensitive services on the system via "sc.exe". Attackers often try to enumerate the services currently running on a system in order to find different attack vectors.

MITRE ATT&CK coverage

TacticTechniques
Credential AccessT1003 OS Credential Dumping

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: all of selection_img

or:
Image|endswith: '\sc.exe'
OriginalFileName: sc.exe

Stage 2: all of selection_cli

CommandLine|contains: query

Stage 3: all of selection_cmd

CommandLine|contains: termservice

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • query corpus 6 (sigma 6)
  • termservice
Imageends_with
  • \sc.exe corpus 17 (sigma 17)
OriginalFileNameeq
  • sc.exe corpus 10 (sigma 10)