← Back to Explore
sigmahighHunting
Important Windows Service Terminated With Error
Detects important or interesting Windows services that got terminated for whatever reason
Detection Query
selection_eid:
Provider_Name: Service Control Manager
EventID: 7023
selection_name:
- param1|contains:
- " Antivirus"
- " Firewall"
- Application Guard
- BitLocker Drive Encryption Service
- Encrypting File System
- Microsoft Defender
- Threat Protection
- Windows Event Log
- Binary|contains:
- 770069006e0064006500660065006e006400
- 4500760065006e0074004c006f006700
- 6d0070007300730076006300
- "530065006e0073006500"
- "450046005300"
- "420044004500530056004300"
condition: all of selection_*
Author
Nasreddine Bencherchali (Nextron Systems)
Created
2023-04-14
Data Sources
windowssystem
Platforms
windows
Tags
attack.defense-evasion
Raw Content
title: Important Windows Service Terminated With Error
id: d6b5520d-3934-48b4-928c-2aa3f92d6963
related:
- id: acfa2210-0d71-4eeb-b477-afab494d596c
type: similar
status: test
description: Detects important or interesting Windows services that got terminated for whatever reason
references:
- https://www.microsoft.com/en-us/security/blog/2023/04/11/guidance-for-investigating-attacks-using-cve-2022-21894-the-blacklotus-campaign/
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-04-14
tags:
- attack.defense-evasion
logsource:
product: windows
service: system
detection:
selection_eid:
Provider_Name: 'Service Control Manager'
EventID: 7023 # The X Service service terminated with the following error
selection_name:
- param1|contains:
# Note that these names are "Display Names" and are language specific. If you're using a non-english system these can and will be different
- ' Antivirus'
- ' Firewall'
- 'Application Guard'
- 'BitLocker Drive Encryption Service'
- 'Encrypting File System'
- 'Microsoft Defender'
- 'Threat Protection'
- 'Windows Event Log'
# Use this If you collect the binary value provided from this event, which is the wide hex encoded value of the service name.
- Binary|contains:
- '770069006e0064006500660065006e006400' # windefend (Microsoft Defender Antivirus Service)
- '4500760065006e0074004c006f006700' # EventLog
- '6d0070007300730076006300' # mpssvc (Windows Defender Firewall)
- '530065006e0073006500' # Sense (Windows Defender Advanced Threat Protection Service)
- '450046005300' # EFS (Encrypting File System)
- '420044004500530056004300' # BDESVC (BitLocker Drive Encryption Service)
condition: all of selection_*
falsepositives:
- Rare false positives could occur since service termination could happen due to multiple reasons
level: high