Skip to content

Conversation

@swachchhanda000
Copy link
Collaborator

Summary of the Pull Request

Changelog

new: Service Startup Type Change Via WMIC
fix: Service Reconnaissance Via Wmic.EXE - filter out legitimate service manipulation cases

Example Log Event

Fixed Issues

SigmaHQ Rule Creation Conventions

  • If your PR adds new rules, please consider following and applying these conventions

@github-actions github-actions bot added Rules Review Needed The PR requires review Windows Pull request add/update windows related rules labels Jan 7, 2026
@swachchhanda000 swachchhanda000 changed the title Wmic service manipulation new: wmic service manipulation Jan 7, 2026
Comment on lines +33 to +42
- 'StartService'
- 'StopService'
- 'Delete'
- 'Create'
- 'ChangeStartMode'
- 'Change'
- 'PauseService'
- 'ResumeService'
- 'SetSecurityDescriptor'
- 'UserControlService'
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Lists have to be ordered

status: experimental
description: |
Detects changes to service startup type to 'disabled' or 'manual' using WMIC command-line utility.
Attackers may change service startup types to evade detection or maintain persistence.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Attackers may change service startup types to evade detection or maintain persistence.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Review Needed The PR requires review Rules Windows Pull request add/update windows related rules

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants