Windows Scheduled Task Create Shell (RedCanary Threat Detection Report)

Detects attempts to establish persistence using schtasks and command shell. Part of the RedCanary 2023 Threat Detection Report.

Sigma rule (View on GitHub)

 1title: Windows Scheduled Task Create Shell (RedCanary Threat Detection Report)
 2id: a916cc1b-7f0e-46b4-9c77-c80b1f2ba26b
 3status: experimental
 4description: Detects attempts to establish persistence using schtasks and command shell. Part of the RedCanary 2023 Threat Detection Report.
 5references:
 6    - https://redcanary.com/threat-detection-report/techniques/windows-command-shell/
 7author: RedCanary, Sigma formatting by Micah Babinski
 8date: 2023/05/10
 9tags:
10    - attack.execution
11    - attack.t1059.003
12logsource:
13    category: process_creation
14    product: windows
15detection:
16    selection:
17        Image|endswith: '\schtasks.exe'
18        CommandLine|contains|windash:
19            - 'create'
20            - 'cmd'
21            - '/c'
22    condition: selection
23falsepositives:
24    - Unknown
25level: low```

References

Related rules

to-top