Skip to the content.

back

Find sigma rule :heavy_check_mark:

Attack: System Service Discovery

Adversaries may try to gather information about registered local system services. Adversaries may obtain information about services using tools as well as OS utility commands such as sc query, tasklist /svc, systemctl --type=service, and net start.

Adversaries may use the information from System Service Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.

MITRE

Tactic

technique

Test : System Service Discovery

OS

Description:

Identify system services.

Upon successful execution, cmd.exe will execute service commands with expected result to stdout.

Executor

command_prompt

Sigma Rule

back