Windows Scheduled Task Creating Shell

Adversaries frequently establish persistence by using scheduled tasks to launch the Windows Command Shell. Detecting this behavior is relatively straightforward. Part of the RedCanary 2024 Threat Detection Report.

Sigma rule (View on GitHub)

 1title: Windows Scheduled Task Creating Shell
 2id: 8b1a34e3-c4d6-4af6-9836-35a0da09b85b
 3status: experimental
 4description: |
 5    Adversaries frequently establish persistence by using scheduled tasks to launch 
 6    the Windows Command Shell. Detecting this behavior is relatively straightforward. 
 7    Part of the RedCanary 2024 Threat Detection Report.    
 8references:
 9    - https://redcanary.com/threat-detection-report/techniques/windows-command-shell/
10author: RedCanary, Sigma formatting by Micah Babinski
11date: 2024/03/21
12tags:
13    - attack.execution
14    - attack.t1059
15    - attack.t1059.003
16    - attack.t1053
17logsource:
18    category: process_creation
19    product: windows
20detection:
21    selection1:
22        Image|endswith: '\schtasks.exe'
23        CommandLine|contains: 'create'
24    selection2:
25        CommandLine|contains:
26            - 'cmd.exe /c'
27            - 'cmd /c'
28    condition: all of selection*
29falsepositives:
30    - Unknown
31level: low```

References

Related rules

to-top