← Back to Explore
sigmamediumHunting
Service Startup Type Change Via Wmic.EXE
Detects changes to service startup type to 'disabled' or 'manual' using the WMIC command-line utility.
Detection Query
selection_img:
- Image|endswith: \WMIC.exe
- OriginalFileName: wmic.exe
selection_cli:
CommandLine|contains|all:
- " service "
- ChangeStartMode
CommandLine|contains:
- Manual
- Disabled
condition: all of selection_*
Author
Swachchhanda Shrawan Poudel (Nextron Systems)
Created
2026-04-27
Data Sources
windowsProcess Creation Events
Platforms
windows
References
Tags
attack.executionattack.defense-impairmentattack.t1047attack.t1685
Raw Content
title: Service Startup Type Change Via Wmic.EXE
id: c0514f28-fdae-42df-b886-06e2b2bc5b37
status: experimental
description: |
Detects changes to service startup type to 'disabled' or 'manual' using the WMIC command-line utility.
references:
- https://blog.talosintelligence.com/uncovering-qilin-attack-methods-exposed-through-multiple-cases/
author: Swachchhanda Shrawan Poudel (Nextron Systems)
date: 2026-04-27
tags:
- attack.execution
- attack.defense-impairment
- attack.t1047
- attack.t1685
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\WMIC.exe'
- OriginalFileName: 'wmic.exe'
selection_cli:
CommandLine|contains|all:
- ' service '
- 'ChangeStartMode'
CommandLine|contains:
- 'Manual'
- 'Disabled'
condition: all of selection_*
falsepositives:
- Legitimate administrative changes to service startup types using WMIC, investigate accordingly.
level: medium
regression_tests_path: regression_data/rules/windows/process_creation/proc_creation_win_wmic_service_startup_change/info.yml