Ransomware Service Manipulation

Defense Evasion Impact T1562.001 T1489 Detection difficulty: LOW Prevalence: HIGH

Before encrypting files, ransomware operators stop and delete security tools, backup services, and database engines to maximize impact and prevent recovery. This service manipulation phase is the last detectable warning before encryption begins. The chokepoint is immutable: admin/SYSTEM privileges, service enumeration, and service stop/delete capability are always required regardless of which ransomware family is executing. This pattern has remained consistent across all major ransomware families from 2021 to present, with kill lists expanding but the core behavior unchanged.

Prerequisites (Environmental)

  • Admin or SYSTEM privileges already established on target system
  • Target security, backup, and database services are running (cannot stop what is not running)

Variations

Tools and methods that exploit this chokepoint — the list grows; the chokepoint doesn't change:

BlackBasta Inactive
2022

Collapsed February 2025 after internal chat logs leaked; members migrated to CACTUS and SafePay

Source →
Alphv/BlackCat Defunct
2021

FBI-disrupted December 2023; exited via scam after $22M Change Healthcare ransom

Source →
Akira Active
2023

Prioritizes Defender and backup agents; targets VPN appliances for initial access

Qilin Active
2022

Rebranded from Agenda; surged with NHS/Synnovis attack June 2024

LockBit 3.0 Severely Disrupted
2022

Operation Cronos seized 28 servers and 1,000+ decryption keys; significantly disrupted

Source →

Detection Strategy

Build detections iteratively. Start broad to understand your baseline, then tighten to production-ready.

Goal: Identify security or backup service state changes (stopped)

Log Sources

  • Windows System Event ID 7036 (Service State Change)
  • Windows System Event ID 7040 (Service Start Type Change)

FP Rate: High

Use Case: Baseline service stop frequency and patterns; identify maintenance windows vs. anomalies

Detection Logic

Event ID: 7036 Service Name: Contains "sophos" OR "defender" OR "veeam" OR "backup" OR "antivirus" State: Stopped
Sigma Rule — Research Level
title: Security or Backup Service Stopped
id: b4c8d0e2-f4a6-4b8c-0d2e-2f4a6b8c0d2e
status: experimental
description: >
  Detects security product and backup service state changes to "stopped".
  Research-level rule for the ransomware service manipulation chokepoint.
  Establishes a baseline of how often security and backup services stop in the
  environment (maintenance windows, updates, reboots) to tune higher-fidelity
  detection. High false positive rate expected.
references:
  - https://attack.mitre.org/techniques/T1562/001/
  - https://attack.mitre.org/techniques/T1489/
  - https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/06/23093553/Common-TTPs-of-the-modern-ransomware_low-res.pdf
author: "@iimp0ster"
date: 2025/01/15
tags:
  - attack.defense_evasion
  - attack.t1562.001
  - attack.impact
  - attack.t1489
  - detection.maturity.research
logsource:
  product: windows
  service: system
detection:
  selection_event:
    EventID: 7036
    # "The X service entered the stopped state."
    Message|contains: 'entered the stopped state'
  selection_security_services:
    Message|contains:
      # Sophos
      - 'Sophos'
      - 'sophos'
      # Microsoft Defender
      - 'WinDefend'
      - 'Windows Defender'
      - 'Sense'
      - 'WdNisSvc'
      # Generic AV/EDR patterns
      - 'Antivirus'
      - 'antivirus'
      # Backup services
      - 'Veeam'
      - 'veeam'
      - 'Volume Shadow Copy'
      - 'VSS'
      - 'wbengine'
      - 'Acronis'
      - 'acronis'
  condition: selection_event and selection_security_services
falsepositives:
  - System reboots (all services stop)
  - AV/EDR product updates (service restarts)
  - Maintenance windows (planned service stops)
  - Backup service completion cycles (Veeam, etc. stop between jobs)
level: low

Goal: Service stop + delete combination for security or backup services in rapid succession

Log Sources

  • Windows System Event ID 7036 (Service State Change)
  • Windows System Event ID 7040 (Service Start Type Change)
  • Sysmon Event ID 1 (Process Creation for sc.exe, net.exe)

FP Rate: Medium

Use Case: Hunt for ransomware preparation activity; identifies pre-encryption service manipulation

Detection Logic

Process: sc.exe OR net.exe OR powershell.exe OR taskkill.exe CommandLine: "stop" AND (service keyword in: sophos, defender, veeam, backup, acronis, mssql, mysql) Within 60 seconds: Same or related service: "delete" OR "disabled" via sc.exe OR: 3+ security/backup services stopped within 5-minute window from same process/session
Sigma Rule — Hunt Level
title: Multiple Security or Backup Services Stopped or Deleted in Rapid Succession
id: c5d9e1f3-a5b7-4c9d-1e3f-3a5b7c9d1e3f
status: experimental
description: >
  Detects sc.exe, net.exe, or taskkill.exe used to stop or delete security/backup
  services, with specific focus on service deletion within 60 seconds of a stop
  command (a strong indicator of ransomware preparation). Also catches rapid-fire
  service stops targeting multiple services within a 5-minute window.
references:
  - https://attack.mitre.org/techniques/T1562.001/
  - https://attack.mitre.org/techniques/T1489/
  - https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/06/23093553/Common-TTPs-of-the-modern-ransomware_low-res.pdf
author: "@iimp0ster"
date: 2025/01/15
tags:
  - attack.defense_evasion
  - attack.t1562.001
  - attack.impact
  - attack.t1489
  - detection.maturity.hunt
logsource:
  category: process_creation
  product: windows
detection:
  selection_stop_tools:
    Image|endswith:
      - '\sc.exe'
      - '\net.exe'
      - '\net1.exe'
      - '\taskkill.exe'
  # Service stop commands targeting security/backup services
  selection_stop_action:
    CommandLine|contains:
      - ' stop '
      - ' delete '
      - '/IM '  # taskkill /IM
  selection_security_targets:
    CommandLine|contains:
      # Sophos
      - 'Sophos'
      - 'sophos'
      - 'SAVService'
      - 'SophosFileScanner'
      # Windows Defender
      - 'WinDefend'
      - 'Sense'
      - 'WdNisSvc'
      - 'WdFilter'
      - 'MsMpEng'
      # Veeam
      - 'Veeam'
      - 'veeam'
      # Volume Shadow Copy
      - 'VSS'
      - 'vss'
      - 'wbengine'
      # SQL / Database
      - 'MSSQL'
      - 'SQLWriter'
      - 'MySQL'
      - 'postgresql'
      # Acronis
      - 'Acronis'
      - 'acronis'
      # Generic backup patterns
      - 'backup'
      - 'Backup'
  condition: selection_stop_tools and selection_stop_action and selection_security_targets
falsepositives:
  - Planned maintenance by system administrators (compare against change management records)
  - AV/EDR product uninstallation during software upgrade cycles
  - IT operations during system decommissioning
level: medium

Goal: Network logon + bulk service termination targeting specific security/backup services within a tight window

Log Sources

  • Sysmon Event ID 1 (Process Creation)
  • Windows Security Event ID 4624 (Logon)
  • Windows System Event ID 7036 (Service State)
  • Windows System Event ID 7040/7045 (Service Config)

FP Rate: Low

Use Case: SOC alerting; ransomware pre-encryption detection with minimal time to respond

Detection Logic

Source: Network Logon (4624, LogonType 3) OR local admin session Process: sc.exe OR net.exe OR taskkill.exe Services stopped (5 or more within 10-minute window), targeting:
  Security: SophosFileScanner OR SAVService OR WinDefend OR Sense OR MsMpEng
  Backup: Veeam* OR VeeamDeploymentService OR VSS OR wbengine OR *acronis*
  Database: MSSQL* OR SQLWriter OR MySQL* OR postgresql*
Service delete: Attempted within 2 minutes of service stop Context: After-hours activity (outside 08:00-18:00 local) OR unusual source IP
Sigma Rule — Analyst Level
title: Ransomware Pre-Encryption — Bulk Service Termination Targeting Sophos File Scanner
id: d6e0f2a4-b6c8-4d0e-2f4a-4b6c8d0e2f4a
status: experimental
description: >
  High-fidelity detection for ransomware pre-encryption activity. Detects sc.exe
  stopping the Sophos File Scanner service (SophosFileScanner) followed by service
  deletion — a specific TTP observed in Alphv/BlackCat, BlackBasta, and LockBit
  campaigns. This combination of stop + delete targeting a named security service
  via a network logon session is a very strong pre-encryption indicator.
  Inspired by the detection iteration demonstrated in the "Detection Chokepoints"
  talk (BSidesSLC / Huntress).
references:
  - https://attack.mitre.org/techniques/T1562/001/
  - https://attack.mitre.org/techniques/T1489/
  - https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/06/23093553/Common-TTPs-of-the-modern-ransomware_low-res.pdf
  - https://www.mandiant.com/m-trends
author: "@iimp0ster"
date: 2025/01/15
tags:
  - attack.defense_evasion
  - attack.t1562.001
  - attack.impact
  - attack.t1489
  - detection.maturity.analyst
logsource:
  category: process_creation
  product: windows
detection:
  selection_sc_stop:
    Image|endswith: '\sc.exe'
    CommandLine|contains|all:
      - 'stop'
      - 'SophosFileScanner'
  selection_sc_delete:
    Image|endswith: '\sc.exe'
    CommandLine|contains|all:
      - 'delete'
      - 'SophosFileScanner'
  condition: selection_sc_stop or selection_sc_delete
falsepositives:
  - Sophos product uninstallation by authorized IT staff
  - Sophos version upgrade process (stop old, install new)
level: high

Early Detection Layers

Detect before the user pastes or executes — earlier in the kill chain than the Sysmon-based rules above, using different data sources.

OSINT Sources

Intel Resources

Related Chokepoints