Detection rules › Splunk

Windows Service Stop Win Updates

Author
Teoderick Contreras, Splunk
Source
upstream

The following analytic detects the disabling of Windows Update services, such as "Update Orchestrator Service for Windows Update," "WaaSMedicSvc," and "Windows Update." It leverages Windows System Event ID 7040 logs to identify changes in service start modes to 'disabled.' This activity is significant as it can indicate an adversary's attempt to evade defenses by preventing critical updates, leaving the system vulnerable to exploits. If confirmed malicious, this could allow attackers to maintain persistence and exploit unpatched vulnerabilities, compromising the integrity and security of the affected host.

MITRE ATT&CK coverage

TacticTechniques
ImpactT1489 Service Stop

Event coverage

ProviderEvent IDTitle
Service-Control-Manager7040

Stages and Predicates

Stage 1: search

search (param1 IN ("UsoSvc", "WaaSMedicSvc", "wuauserv") OR service_name IN ("Update Orchestrator Service for Windows Update", "WaaSMedicSvc", "Windows Update")) (param3="disabled" OR start_mode="disabled") EventCode=7040

Stage 2: stats

stats BY Computer, Error_Code, service_name, start_mode, param1, param2, param3, param4

Stage 3: rename

rename

Stage 4: search

search

Stage 5: search

search

Stage 6: search

search `macro`

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
EventCodeeq
  • 7040 corpus 3 (splunk 3)
param1in
  • "UsoSvc"
  • "WaaSMedicSvc"
  • "wuauserv"
param3eq
  • disabled
service_namein
  • "Update Orchestrator Service for Windows Update"
  • "WaaSMedicSvc"
  • "Windows Update"
start_modeeq
  • disabled

Neighbors

Broader alternatives (more inclusive than this rule)

These rules match a superset of what this rule catches. They cover the same events plus more. Use them if you want wider coverage and can absorb more false positives.