<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Windows Event Log Security — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/windows-event-log-security/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/windows-event-log-security/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Attempt to Stop Security Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-stop-security-service/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-stop-security-service/</guid><description>An attacker attempts to stop security services on a Windows endpoint using sc.exe, net.exe, or PowerShell Stop-Service cmdlet to weaken defenses for further malicious activity.</description><content:encoded><![CDATA[<p>Attackers commonly attempt to disable or stop security services on compromised endpoints to evade detection and facilitate further malicious activities. This involves using built-in Windows utilities like <code>sc.exe</code> (Service Control) and <code>net.exe</code>, as well as the <code>Stop-Service</code> PowerShell cmdlet. Disabling these services can allow attackers to deploy malware, escalate privileges, exfiltrate data, or cause widespread damage without being detected. This activity is a strong indicator of compromise and requires immediate investigation to prevent further damage to the organization. Campaigns like WhisperGate and destructive malware targeting Ukrainian organizations have used this technique to amplify their impact.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to the Windows endpoint through various means, such as phishing, exploiting vulnerabilities, or compromised credentials.</li>
<li>Privilege Escalation: The attacker escalates privileges to gain administrative rights, which are required to stop security services.</li>
<li>Service Discovery: The attacker enumerates the running services to identify security-related services (e.g., antivirus, EDR, logging).</li>
<li>Stop Security Service (sc.exe): The attacker uses the <code>sc.exe stop &lt;service_name&gt;</code> command to attempt to stop a targeted service.</li>
<li>Stop Security Service (net.exe): Alternatively, the attacker uses <code>net stop &lt;service_name&gt;</code> to disable the service.</li>
<li>Stop Security Service (PowerShell): The attacker employs the <code>Stop-Service &lt;service_name&gt;</code> PowerShell cmdlet to halt the service.</li>
<li>Defense Evasion: With security services disabled, the attacker can now execute malicious code, install malware, or exfiltrate data without triggering alerts.</li>
<li>Lateral Movement/Impact: The attacker moves laterally to other systems or achieves their objective, such as data theft, ransomware deployment, or system destruction.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of security services can lead to a significant degradation of an organization&rsquo;s security posture. This may result in widespread malware infections, data breaches, and system compromise. Organizations that have experienced these attacks have suffered financial losses, reputational damage, and operational disruptions. Examples include data destruction campaigns observed in the WhisperGate attacks and other destructive malware incidents targeting Ukrainian organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Windows Service Stop via sc.exe</code> to identify attempts to stop services via the command line.</li>
<li>Deploy the Sigma rule <code>Detect Windows Service Stop via PowerShell</code> to identify attempts to stop services via the PowerShell cmdlet.</li>
<li>Enable and monitor process creation logs (Sysmon Event ID 1 or Windows Event Log Security 4688) to capture the necessary command-line details for detection.</li>
<li>Investigate any alerts generated by the Sigma rules above immediately to determine the scope and impact of the potential compromise.</li>
<li>Ensure that appropriate access controls are in place to restrict the ability to stop critical security services to authorized personnel only.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>endpoint</category><category>windows</category></item><item><title>Windows AD Domain Controller Audit Policy Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-domain-controller-audit-disabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-domain-controller-audit-disabled/</guid><description>Detection of disabled audit policies on a Windows domain controller by monitoring Windows Security Event Logs for EventCode 4719, indicative of an attacker attempting to evade detection and potentially leading to data theft, privilege escalation, and full network compromise.</description><content:encoded><![CDATA[<p>This detection identifies the disabling of audit policies on a Windows Active Directory domain controller, a critical security event that can signify malicious activity. The detection uses Windows Security Event Logs, specifically EventCode 4719, to monitor for changes where success or failure auditing is removed. Attackers often disable audit policies to evade detection after gaining unauthorized access to a domain controller. This activity can be a precursor to more severe attacks, including data theft, privilege escalation, and full network compromise. The analytic leverages a Splunk search query designed to identify alterations to audit policies and provide context through lookups to identify the specific policies affected. The original Splunk detection was published on 2026-05-05.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains unauthorized access to a domain controller, often through credential theft or exploiting a vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates their privileges to a level sufficient to modify audit policies, such as through exploiting a privilege escalation vulnerability or using compromised administrator credentials.</li>
<li><strong>Discovery:</strong> The attacker performs reconnaissance to identify existing audit policies and their configurations.</li>
<li><strong>Disable Auditing:</strong> The attacker disables specific audit policies on the domain controller using tools native to the operating system or by directly modifying Group Policy Objects (GPOs). This action generates Windows Security Event Log 4719.</li>
<li><strong>Evasion:</strong> By disabling auditing, the attacker attempts to evade detection by security monitoring tools and personnel.</li>
<li><strong>Lateral Movement/Data Theft/Privilege Escalation:</strong> With auditing disabled, the attacker can now perform lateral movement, data theft, or further privilege escalation without generating the usual audit logs that would alert defenders.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence mechanisms to maintain access to the compromised domain controller, such as creating rogue accounts or modifying system configurations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of audit policies on a domain controller can have severe consequences. It allows attackers to operate undetected within the network, potentially leading to data theft, privilege escalation, and complete network compromise. Without proper auditing, security teams lose visibility into malicious activities, making incident response and forensic investigations significantly more difficult. The impact is magnified by the central role domain controllers play in network authentication and authorization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and monitor Windows Security Event Log EventCode 4719 on all domain controllers (reference: Overview).</li>
<li>Deploy the Sigma rule provided in this brief to your SIEM and tune it for your environment (reference: Sigma rule).</li>
<li>Investigate any instances of EventCode 4719 where audit policies are disabled on domain controllers to determine the source and intent of the change (reference: Overview).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category></item></channel></rss>