← Back to SOC feed Coverage →

Disabling Security Tools

sigma MEDIUM SigmaHQ
T1562.004
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: medium

Hunt Hypothesis

Adversaries may disable security tools to evade detection and maintain persistence within the network. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate potential long-term threats before they cause significant damage.

Detection Rule

Sigma (Original)

title: Disabling Security Tools
id: e3a8a052-111f-4606-9aee-f28ebeb76776
status: test
description: Detects disabling security tools
references:
    - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.004/T1562.004.md
author: Ömer Günal, Alejandro Ortuno, oscd.community
date: 2020-06-17
modified: 2022-10-09
tags:
    - attack.defense-evasion
    - attack.t1562.004
logsource:
    category: process_creation
    product: linux
detection:
    selection_iptables_1:
        Image|endswith: '/service'
        CommandLine|contains|all:
            - 'iptables'
            - 'stop'
    selection_iptables_2:
        Image|endswith: '/service'
        CommandLine|contains|all:
            - 'ip6tables'
            - 'stop'
    selection_iptables_3:
        Image|endswith: '/chkconfig'
        CommandLine|contains|all:
            - 'iptables'
            - 'stop'
    selection_iptables_4:
        Image|endswith: '/chkconfig'
        CommandLine|contains|all:
            - 'ip6tables'
            - 'stop'
    selection_firewall_1:
        Image|endswith: '/systemctl'
        CommandLine|contains|all:
            - 'firewalld'
            - 'stop'
    selection_firewall_2:
        Image|endswith: '/systemctl'
        CommandLine|contains|all:
            - 'firewalld'
            - 'disable'
    selection_carbonblack_1:
        Image|endswith: '/service'
        CommandLine|contains|all:
            - 'cbdaemon'
            - 'stop'
    selection_carbonblack_2:
        Image|endswith: '/chkconfig'
        CommandLine|contains|all:
            - 'cbdaemon'
            - 'off'
    selection_carbonblack_3:
        Image|endswith: '/systemctl'
        CommandLine|contains|all:
            - 'cbdaemon'
            - 'stop'
    selection_carbonblack_4:
        Image|endswith: '/systemctl'
        CommandLine|contains|all:
            - 'cbdaemon'
            - 'disable'
    selection_selinux:
        Image|endswith: '/setenforce'
        CommandLine|contains: '0'
    selection_crowdstrike_1:
        Image|endswith: '/systemctl'
        CommandLine|contains|all:
            - 'stop'
            - 'falcon-sensor'
    selection_crowdstrike_2:
        Image|endswith: '/systemctl'
        CommandLine|contains|all:
            - 'disable'
            - 'falcon-sensor'
    condition: 1 of selection*
falsepositives:
    - Legitimate administration activities
level: medium

KQL (Azure Sentinel)

imProcessCreate
| where (TargetProcessName endswith "/service" and (TargetProcessCommandLine contains "iptables" and TargetProcessCommandLine contains "stop")) or (TargetProcessName endswith "/service" and (TargetProcessCommandLine contains "ip6tables" and TargetProcessCommandLine contains "stop")) or (TargetProcessName endswith "/chkconfig" and (TargetProcessCommandLine contains "iptables" and TargetProcessCommandLine contains "stop")) or (TargetProcessName endswith "/chkconfig" and (TargetProcessCommandLine contains "ip6tables" and TargetProcessCommandLine contains "stop")) or (TargetProcessName endswith "/systemctl" and (TargetProcessCommandLine contains "firewalld" and TargetProcessCommandLine contains "stop")) or (TargetProcessName endswith "/systemctl" and (TargetProcessCommandLine contains "firewalld" and TargetProcessCommandLine contains "disable")) or (TargetProcessName endswith "/service" and (TargetProcessCommandLine contains "cbdaemon" and TargetProcessCommandLine contains "stop")) or (TargetProcessName endswith "/chkconfig" and (TargetProcessCommandLine contains "cbdaemon" and TargetProcessCommandLine contains "off")) or (TargetProcessName endswith "/systemctl" and (TargetProcessCommandLine contains "cbdaemon" and TargetProcessCommandLine contains "stop")) or (TargetProcessName endswith "/systemctl" and (TargetProcessCommandLine contains "cbdaemon" and TargetProcessCommandLine contains "disable")) or (TargetProcessName endswith "/setenforce" and TargetProcessCommandLine contains "0") or (TargetProcessName endswith "/systemctl" and (TargetProcessCommandLine contains "stop" and TargetProcessCommandLine contains "falcon-sensor")) or (TargetProcessName endswith "/systemctl" and (TargetProcessCommandLine contains "disable" and TargetProcessCommandLine contains "falcon-sensor"))

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/linux/process_creation/proc_creation_lnx_security_tools_disabling.yml