<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Service-Creation — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/service-creation/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/service-creation/feed.xml" rel="self" type="application/rss+xml"/><item><title>Service Control Executed from Script Interpreters</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-service-control-script-spawn/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-service-control-script-spawn/</guid><description>Detection of Service Control (sc.exe) being spawned from script interpreter processes, such as PowerShell or cmd.exe, to create, modify, or start services, which may indicate privilege escalation or persistence attempts by an attacker.</description><content:encoded><![CDATA[<p>This detection identifies instances where the Service Control utility (sc.exe) is executed from within a script interpreter, such as cmd.exe, PowerShell, or wscript.exe. Attackers may leverage this behavior to create, modify, or start Windows services, often with the intent to elevate privileges or establish persistence on a compromised system. The sc.exe is a legitimate Windows command-line tool used for managing services. Abusing this tool allows attackers to perform malicious actions under the guise of legitimate system administration. This detection is designed to identify anomalous use of sc.exe that deviates from typical administrative tasks, focusing on instances where it&rsquo;s spawned from scripting environments often used for malicious activities. The rule specifically excludes service creations performed by the SYSTEM user.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system via an exploit or compromised credentials.</li>
<li>The attacker executes a script interpreter (e.g., cmd.exe, powershell.exe).</li>
<li>Within the script interpreter, the attacker uses sc.exe to manage Windows services.</li>
<li>The sc.exe command is used with arguments such as &ldquo;create&rdquo;, &ldquo;start&rdquo;, &ldquo;stop&rdquo;, &ldquo;delete&rdquo;, or &ldquo;config&rdquo; to manipulate service configurations.</li>
<li>A new service is created or an existing service is modified to execute a malicious payload.</li>
<li>The malicious service is started, allowing the attacker to execute code with elevated privileges (SYSTEM).</li>
<li>The attacker achieves persistence by ensuring the malicious service automatically starts upon system reboot.</li>
<li>The attacker may use the created service to execute additional malicious commands or maintain remote access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to complete system compromise with the attacker gaining SYSTEM level privileges. This can allow for lateral movement within the network, data exfiltration, or installation of persistent backdoors. While the frequency of this specific technique may be low, the potential impact is high due to the elevated privileges gained.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Service Control Spawning via Script Interpreter</code> to your SIEM to detect this specific behavior and tune it to your environment.</li>
<li>Monitor process creation events for sc.exe being executed by script interpreters like PowerShell or cmd.exe (as covered in the rule description).</li>
<li>Investigate any instances of sc.exe being used with the arguments &ldquo;create&rdquo;, &ldquo;start&rdquo;, &ldquo;stop&rdquo;, &ldquo;delete&rdquo;, or &ldquo;config&rdquo; from scripting environments to identify potentially malicious activity.</li>
<li>Ensure proper access controls are in place to limit the ability of users to create or modify services.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privilege-escalation</category><category>defense-evasion</category><category>execution</category><category>windows</category><category>service-creation</category></item></channel></rss>