Skip to content
Threat Feed
high advisory

Excessive Service Control Start as Disabled

Detection of an excessive number of `sc.exe` processes launched with the `start= disabled` argument indicating potential attempts to disable critical services and impair system defenses.

This threat brief focuses on detecting malicious activity related to the disabling of Windows services using the sc.exe utility. Attackers may leverage this technique to impair system defenses, disable security mechanisms, and hinder incident response. This behavior is typically observed post-compromise, where an attacker has already gained access to the system. The detection logic identifies an unusually high number of sc.exe processes with the start= disabled argument executed within a short timeframe (30 minutes). This activity is often indicative of automated scripts or tools attempting to systematically disable multiple services, potentially to facilitate further malicious activities or maintain persistence.

Attack Chain

  1. Initial access is achieved through an unknown method (e.g., phishing, exploitation of a vulnerability).
  2. The attacker gains elevated privileges on the system.
  3. The attacker uses sc.exe to disable specific services.
  4. The attacker executes a script that iterates through a list of services to disable.
  5. Each iteration uses sc.exe with the start= disabled argument.
  6. Multiple sc.exe processes are launched in a short period (30 minutes).
  7. The disabled services may include security tools, logging services, or critical system components.
  8. The attacker achieves a weakened security posture, enabling further malicious activities such as lateral movement or data exfiltration.

Impact

Successful execution of this attack can severely compromise the security posture of the affected system. By disabling critical services, attackers can evade detection, prevent incident responders from accessing logs, and maintain persistent access. This can lead to data breaches, system downtime, and significant financial losses. The impact can range from individual workstations to entire networks, depending on the scope of the attacker’s activities.

Recommendation

  • Deploy the Sigma rule “Excessive sc.exe Service Disabling” to detect a high volume of sc.exe processes disabling services within a short timeframe, and tune the threshold (currently 8) to match your environment.
  • Enable process creation logging with command line arguments via Sysmon (Event ID 1) to ensure visibility into sc.exe executions.
  • Investigate any alerts generated by the Sigma rule, focusing on the parent processes of the sc.exe commands and the user accounts involved.
  • Review the Microsoft documentation on sc.exe to understand its legitimate uses and identify potential false positives (https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/sc-create).
  • Consider implementing application control policies to restrict the execution of sc.exe to authorized users and processes.

Detection coverage 2

Excessive sc.exe Service Disabling

high

Detects an excessive number of sc.exe processes launched with the start= disabled argument within a short period.

sigma tactics: defense_evasion techniques: T1562.001 sources: process_creation, windows

Suspicious Parent Process of sc.exe

medium

Detects sc.exe being launched by suspicious parent processes, indicating potential malicious activity.

sigma tactics: defense_evasion techniques: T1562.001 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →