Kapeka Backdoor Scheduled Task Creation
Detects Kapeka backdoor scheduled task creation based on attributes such as paths, commands line flags, etc.
Sigma rule (View on GitHub)
1title: Kapeka Backdoor Scheduled Task Creation
2id: 6c130acd-0adb-4545-bcc4-2e85d0883c9a
3related:
4 - id: 64a871dd-83f6-4e5f-80fc-5a7ca3a8a819
5 type: similar
6status: experimental
7description: Detects Kapeka backdoor scheduled task creation based on attributes such as paths, commands line flags, etc.
8references:
9 - https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4698
10 - https://labs.withsecure.com/publications/kapeka
11 - https://app.any.run/tasks/1efb3ed4-cc0f-4690-a0ed-24516809bc72/
12 - https://www.virustotal.com/gui/file/bd07fb1e9b4768e7202de6cc454c78c6891270af02085c51fce5539db1386c3f/behavior
13author: Swachchhanda Shrawan Poudel
14date: 2024-07-03
15tags:
16 - attack.execution
17 - attack.privilege-escalation
18 - attack.persistence
19 - attack.t1053.005
20logsource:
21 product: windows
22 service: security
23 definition: 'Requirements: The Advanced Audit Policy setting Object Access > Audit Other Object Access Events has to be configured to trigger this detection.'
24detection:
25 selection_eid:
26 EventID: 4698
27 selection_paths:
28 TaskContent|contains:
29 - ':\ProgramData\'
30 - '\AppData\Local\'
31 selection_command:
32 TaskContent|contains|all:
33 - 'rundll32'
34 - '.wll'
35 - '#1'
36 selection_taskname:
37 TaskContent|contains:
38 - 'OneDrive' # The scheduled task was called “OneDrive” instead of “Sens Api” in some cases
39 - 'Sens Api'
40 condition: all of selection_*
41falsepositives:
42 - Unknown
43level: high
References
Related rules
- HackTool - Default PowerSploit/Empire Scheduled Task Creation
- Important Scheduled Task Deleted/Disabled
- Scheduled Task Creation Via Schtasks.EXE
- Suspicious Scheduled Task Creation
- Suspicious Scheduled Task Update