<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Service-Disabling — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/service-disabling/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/service-disabling/feed.xml" rel="self" type="application/rss+xml"/><item><title>Excessive Windows Service Disabling Events</title><link>https://feed.craftedsignal.io/briefs/2024-01-excessive-disabled-services/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-excessive-disabled-services/</guid><description>An adversary may disable critical Windows services to evade defenses or disrupt system operations, detected by monitoring for an excessive number of service-disabled events on a single host.</description><content:encoded><![CDATA[<p>This threat brief addresses the potential for adversaries to disable critical Windows services as a means of defense evasion or to facilitate destructive actions. The detection focuses on identifying hosts that exhibit an unusually high volume of service-disabled events within a short timeframe. This behavior is often indicative of malicious activity, particularly when security-related services are targeted. Monitoring for excessive service disabling events is crucial because it can reveal attempts to weaken or bypass security controls, allowing attackers to operate with greater impunity. The analytic leverages Windows Event Logs (EventCode 7040) to detect multiple service state changes on a single host.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the target system through methods such as phishing, exploiting vulnerabilities, or using compromised credentials.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates privileges to gain administrative or SYSTEM-level access, which is required to modify service configurations.</li>
<li><strong>Service Enumeration:</strong> The attacker enumerates installed services to identify potential targets for disabling. This may involve using tools like <code>sc.exe</code> or PowerShell cmdlets like <code>Get-Service</code>.</li>
<li><strong>Identify Target Services:</strong> The attacker identifies security solutions, logging mechanisms, or critical system components that are running as services.</li>
<li><strong>Service Disabling:</strong> The attacker disables the targeted services using tools like <code>sc.exe config &lt;service_name&gt; start= disabled</code>, PowerShell&rsquo;s <code>Set-Service</code> cmdlet, or by directly modifying the service&rsquo;s registry keys.</li>
<li><strong>Defense Evasion:</strong> Disabling security services allows the attacker to evade detection and monitoring, hindering incident response efforts.</li>
<li><strong>Lateral Movement/Persistence:</strong> With defenses weakened, the attacker can move laterally within the network or establish persistent access without being detected.</li>
<li><strong>Objective Completion:</strong> The attacker achieves their final objectives, which may include data theft, ransomware deployment, or system disruption, without interference from security controls.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a significant degradation of the target&rsquo;s security posture. The disabling of security services can blind defenders, allowing attackers to move laterally, exfiltrate data, or deploy ransomware with little or no resistance. This can result in significant financial losses, reputational damage, and operational disruption. The CISA AA23-347A advisory highlights that adversaries often disable or impair security tools before deploying ransomware or conducting other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule <code>Excessive Windows Service Disabled Events</code> to detect hosts exhibiting an unusual number of service-disabled events (Windows Event Log System 7040). Tune the threshold (count &gt;=10) based on your environment&rsquo;s baseline.</li>
<li>Investigate any alerts generated by the <code>Excessive Windows Service Disabled Events</code> Sigma rule to determine the cause of the service state changes.</li>
<li>Enable Windows Event Logging for System events (EventCode 7040) to ensure the necessary data source is available.</li>
<li>Review the Talos Intelligence blog post on Olympic Destroyer (<a href="https://blog.talosintelligence.com/2018/02/olympic-destroyer.html">https://blog.talosintelligence.com/2018/02/olympic-destroyer.html</a>) for insights into how service disabling is used in destructive attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>service-disabling</category><category>windows</category></item></channel></rss>