Potential KamiKakaBot Activity - Shutdown Schedule Task Creation

Detects the creation of a schedule task that runs weekly and execute the "shutdown /l /f" command. This behavior was observed being used by KamiKakaBot samples in order to achieve persistence on a system.

Sigma rule (View on GitHub)

 1title: Potential KamiKakaBot Activity - Shutdown Schedule Task Creation
 2id: fe9e8ba9-4419-41e6-a574-bd9f7b3af961
 3status: experimental
 4description: |
 5    Detects the creation of a schedule task that runs weekly and execute the "shutdown /l /f" command.
 6    This behavior was observed being used by KamiKakaBot samples in order to achieve persistence on a system.    
 7references:
 8    - https://www.nextron-systems.com/2024/03/22/unveiling-kamikakabot-malware-analysis/
 9    - https://tria.ge/240123-rapteaahhr/behavioral1
10author: Nasreddine Bencherchali (Nextron Systems), X__Junior (Nextron Systems)
11date: 2024/03/22
12tags:
13    - attack.persistence
14    - detection.emerging_threats
15logsource:
16    category: process_creation
17    product: windows
18detection:
19    selection:
20        Image|endswith: '\schtasks.exe'
21        CommandLine|contains|all:
22            - ' /create '
23            - 'shutdown /l /f'
24            - 'WEEKLY'
25    filter_main_system_user:
26        User|contains: # covers many language settings
27            - 'AUTHORI'
28            - 'AUTORI'
29    condition: selection and not 1 of filter_main_*
30falsepositives:
31    - Unknown
32level: medium

References

Related rules

to-top