Kapeka Backdoor Scheduled Task Creation

Detects Kapeka backdoor scheduled task creation based on attributes such as paths, commands line flags, etc.

Sigma rule (View on GitHub)

 1title: Kapeka Backdoor Scheduled Task Creation
 2id: 6c130acd-0adb-4545-bcc4-2e85d0883c9a
 3related:
 4    - id: 64a871dd-83f6-4e5f-80fc-5a7ca3a8a819
 5      type: similar
 6status: experimental
 7description: Detects Kapeka backdoor scheduled task creation based on attributes such as paths, commands line flags, etc.
 8references:
 9    - https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4698
10    - https://labs.withsecure.com/publications/kapeka
11    - https://app.any.run/tasks/1efb3ed4-cc0f-4690-a0ed-24516809bc72/
12    - https://www.virustotal.com/gui/file/bd07fb1e9b4768e7202de6cc454c78c6891270af02085c51fce5539db1386c3f/behavior
13author: Swachchhanda Shrawan Poudel
14date: 2024-07-03
15tags:
16    - attack.execution
17    - attack.privilege-escalation
18    - attack.persistence
19    - attack.t1053.005
20logsource:
21    product: windows
22    service: security
23    definition: 'Requirements: The Advanced Audit Policy setting Object Access > Audit Other Object Access Events has to be configured to trigger this detection.'
24detection:
25    selection_eid:
26        EventID: 4698
27    selection_paths:
28        TaskContent|contains:
29            - ':\ProgramData\'
30            - '\AppData\Local\'
31    selection_command:
32        TaskContent|contains|all:
33            - 'rundll32'
34            - '.wll'
35            - '#1'
36    selection_taskname:
37        TaskContent|contains:
38            - 'OneDrive' # The scheduled task was called “OneDrive” instead of “Sens Api” in some cases
39            - 'Sens Api'
40    condition: all of selection_*
41falsepositives:
42    - Unknown
43level: high

References

Related rules

to-top