Skip to content

Commit f33a18e

Browse files
committed
analytics_enhancement
1 parent abd24d6 commit f33a18e

File tree

1 file changed

+78
-0
lines changed

1 file changed

+78
-0
lines changed
Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,78 @@
1+
name: Known Services Killed by Ransomware
2+
id: 3070f8e0-c528-11eb-b2a0-acde48001122
3+
version: 7
4+
date: '2024-12-10'
5+
author: Teoderick Contreras, Splunk
6+
status: deprecated
7+
type: TTP
8+
description: The following analytic detects the suspicious termination of known services
9+
commonly targeted by ransomware before file encryption. It leverages Windows System
10+
Event Logs (EventCode 7036) to identify when critical services such as Volume Shadow
11+
Copy, backup, and antivirus services are stopped. This activity is significant because
12+
ransomware often disables these services to avoid errors and ensure successful file
13+
encryption. If confirmed malicious, this behavior could lead to widespread data
14+
encryption, rendering files inaccessible and potentially causing significant operational
15+
disruption and data loss.
16+
data_source:
17+
- Windows Event Log System 7036
18+
search: '`wineventlog_system` EventCode=7036 param1 IN ("*Volume Shadow Copy*","*VSS*",
19+
"*backup*", "*sophos*", "*sql*", "*memtas*", "*mepocs*", "*veeam*", "*svc$*", "DefWatch",
20+
"ccEvtMgr", "ccSetMgr", "SavRoam", "RTVscan", "QBFCService", "QBIDPService", "Intuit.QuickBooks.FCS",
21+
"QBCFMonitorService", "YooBackup", "YooIT", "*Veeam*", "PDVFSService", "BackupExec*",
22+
"WdBoot", "WdFilter", "WdNisDrv", "WdNisSvc", "WinDefend", "wscsvc", "Sense", "sppsvc",
23+
"SecurityHealthService") param2="stopped" | stats count min(_time) as firstTime
24+
max(_time) as lastTime by EventCode param1 dest | `security_content_ctime(lastTime)`
25+
| `security_content_ctime(firstTime)` | `known_services_killed_by_ransomware_filter`'
26+
how_to_implement: To successfully implement this search, you need to be ingesting
27+
logs with the 7036 EventCode ScManager in System audit Logs from your endpoints.
28+
known_false_positives: Admin activities or installing related updates may do a sudden
29+
stop to list of services we monitor.
30+
references:
31+
- https://krebsonsecurity.com/2021/05/a-closer-look-at-the-darkside-ransomware-gang/
32+
- https://www.mcafee.com/blogs/other-blogs/mcafee-labs/mcafee-atr-analyzes-sodinokibi-aka-revil-ransomware-as-a-service-what-the-code-tells-us/
33+
- https://news.sophos.com/en-us/2020/04/24/lockbit-ransomware-borrows-tricks-to-keep-up-with-revil-and-maze/
34+
- https://blogs.vmware.com/security/2022/10/lockbit-3-0-also-known-as-lockbit-black.html
35+
drilldown_searches:
36+
- name: View the detection results for - "$dest$"
37+
search: '%original_detection_search% | search dest = "$dest$"'
38+
earliest_offset: $info_min_time$
39+
latest_offset: $info_max_time$
40+
- name: View risk events for the last 7 days for - "$dest$"
41+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest$")
42+
starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime
43+
values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories)
44+
as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic)
45+
as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)`
46+
| `security_content_ctime(lastTime)`'
47+
earliest_offset: $info_min_time$
48+
latest_offset: $info_max_time$
49+
rba:
50+
message: Known services $param1$ terminated by a potential ransomware on $dest$
51+
risk_objects:
52+
- field: dest
53+
type: system
54+
score: 72
55+
threat_objects:
56+
- field: param1
57+
type: service
58+
tags:
59+
analytic_story:
60+
- LockBit Ransomware
61+
- Ransomware
62+
- Compromised Windows Host
63+
- BlackMatter Ransomware
64+
asset_type: Endpoint
65+
mitre_attack_id:
66+
- T1490
67+
product:
68+
- Splunk Enterprise
69+
- Splunk Enterprise Security
70+
- Splunk Cloud
71+
security_domain: endpoint
72+
tests:
73+
- name: True Positive Test
74+
attack_data:
75+
- data:
76+
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1490/known_services_killed_by_ransomware/windows-xml.log
77+
source: XmlWinEventLog:System
78+
sourcetype: XmlWinEventLog

0 commit comments

Comments
 (0)