High Number of Process and/or Service Terminations Detected
A high number of process terminations (stop, delete, or suspend) from the same Windows host within a short time period may indicate malicious activity such as an attacker attempting to disable security measures or prepare for ransomware deployment.
This detection identifies a suspicious pattern of rapid process and service terminations on a Windows host. Attackers commonly stop services and kill processes to disable security tools, release file locks for encryption, or disrupt normal system operations. The rule specifically looks for multiple instances of termination-related commands executed via net.exe, sc.exe, or taskkill.exe within a short timeframe. This activity can be indicative of an attacker preparing a system for ransomware deployment or attempting to evade defenses. The detection focuses on Windows systems, leveraging process monitoring logs. This behavior aligns with tactics used to impair defenses and achieve significant impact on compromised systems.
Attack Chain
- The attacker gains initial access to the Windows host (e.g., through phishing or exploitation).
- The attacker escalates privileges to obtain necessary permissions to terminate processes and services.
- The attacker uses
net.exeto stop specific services, such as backup solutions or security software. - The attacker employs
sc.exeto delete services, preventing them from restarting automatically. - The attacker utilizes
taskkill.exewith flags like/F,/IM, or/PIDto forcefully terminate processes. - The attacker repeats these steps, rapidly terminating multiple processes and services.
- The attacker prepares the system for ransomware deployment by disabling security measures.
- The attacker deploys ransomware, encrypting data and demanding a ransom for its recovery.
Impact
Successful exploitation leads to disruption of critical services, disabling of security controls, and potential data loss. If an attacker successfully terminates security solutions, they can significantly increase the likelihood of successful ransomware deployment or data exfiltration. The impact can range from temporary service outages to complete system compromise and data encryption, resulting in financial losses, reputational damage, and operational disruption.
Recommendation
- Deploy the
High Number of Process Terminations via TaskkillandHigh Number of Service Terminations via SCSigma rules to your SIEM and tune for your environment. - Investigate any alerts triggered by the rules, focusing on the processes terminated and the user accounts involved.
- Enable process creation logging with command-line arguments to ensure the rules have sufficient data to function effectively.
- Review the references provided to understand attacker techniques and improve detection strategies.
- Implement network segmentation to limit the lateral movement of attackers.
- Regularly review and update security policies to prevent unauthorized process termination.
Detection coverage 2
High Number of Process Terminations via Taskkill
mediumDetects a high number of process terminations using taskkill.exe within a short period, indicative of potential malicious activity.
High Number of Service Terminations via SC
mediumDetects a high number of service terminations using sc.exe within a short period, which is a sign of an attacker trying to disable services.
Detection queries are kept inside the platform. Get full rules →