Diamond Sleet APT Scheduled Task Creation
Detects registry event related to the creation of a scheduled task used by Diamond Sleet APT during exploitation of Team City CVE-2023-42793 vulnerability
Sigma rule (View on GitHub)
1title: Diamond Sleet APT Scheduled Task Creation
2id: 3b8e5084-4de9-449a-a40d-0e11014f2e2d
3status: test
4description: |
5 Detects registry event related to the creation of a scheduled task used by Diamond Sleet APT during exploitation of Team City CVE-2023-42793 vulnerability
6references:
7 - https://www.microsoft.com/en-us/security/blog/2023/10/18/multiple-north-korean-threat-actors-exploiting-the-teamcity-cve-2023-42793-vulnerability/
8author: Nasreddine Bencherchali (Nextron Systems)
9date: 2023-10-24
10tags:
11 - attack.execution
12 - attack.privilege-escalation
13 - attack.persistence
14 - attack.t1053.005
15 - detection.emerging-threats
16logsource:
17 product: windows
18 service: security
19 definition: 'The Advanced Audit Policy setting Object Access > Audit Other Object Access Events has to be configured to allow this detection. We also recommend extracting the Command field from the embedded XML in the event data.'
20detection:
21 selection:
22 EventID: 4698
23 TaskName: '\Windows TeamCity Settings User Interface'
24 TaskContent|contains: 'uTYNkfKxHiZrx3KJ'
25 condition: selection
26falsepositives:
27 - Unknown
28level: critical
References
Related rules
- ChromeLoader Malware Execution
- Serpent Backdoor Payload Execution Via Scheduled Task
- HackTool - Default PowerSploit/Empire Scheduled Task Creation
- Important Scheduled Task Deleted/Disabled
- Kapeka Backdoor Scheduled Task Creation