Adversaries may stop or disable services on a system to render those services unavailable to legitimate users. Stopping critical services can inhibit or stop response to an incident or aid in the adversary's overall objectives to cause damage to the environment.(Citation: Talos Olympic Destroyer 2018)(Citation: Novetta Blockbuster)Adversaries may accomplish this by disabling individual services of high importance to an organization, such as
MSExchangeIS
, which will make Exchange content inaccessible (Citation: Novetta Blockbuster). In some cases, adversaries may stop or disable many or all services to render systems unusable.(Citation: Talos Olympic Destroyer 2018) Services may not allow for modification of their data stores while running. Adversaries may stop services in order to conduct Data Destruction or Data Encrypted for Impact on the data stores of services like Exchange and SQL Server.(Citation: SecureWorks WannaCry Analysis)
Stops a specified service using the sc.exe command. Upon execution, if the spooler service was running infomration will be displayed saying it has changed to a state of STOP_PENDING. If the spooler service was not running "The service has not been started." will be displayed and it can be started by running the cleanup command.
Supported Platforms: Windows
Name | Description | Type | Default Value |
---|---|---|---|
service_name | Name of a service to stop | String | spooler |
sc.exe stop #{service_name}
sc.exe start #{service_name} >nul 2>&1
Stops a specified service using the net.exe command. Upon execution, if the service was running "The Print Spooler service was stopped successfully." will be displayed. If the service was not running, "The Print Spooler service is not started." will be displayed and it can be started by running the cleanup command.
Supported Platforms: Windows
Name | Description | Type | Default Value |
---|---|---|---|
service_name | Name of a service to stop | String | spooler |
net.exe stop #{service_name}
net.exe start #{service_name} >nul 2>&1
Stops a specified service killng the service's process. This technique was used by WannaCry. Upon execution, if the spoolsv service was running "SUCCESS: The process "spoolsv.exe" with PID 2316 has been terminated." will be displayed. If the service was not running "ERROR: The process "spoolsv.exe" not found." will be displayed and it can be started by running the cleanup command.
Supported Platforms: Windows
Name | Description | Type | Default Value |
---|---|---|---|
process_name | Name of a process to kill | String | spoolsv.exe |
taskkill.exe /f /im #{process_name}