Important Scheduled Task Deleted
Detects when adversaries try to stop system services or processes by deleting their respective scheduled tasks in order to conduct data destructive activities
Sigma rule (View on GitHub)
 1title: Important Scheduled Task Deleted
 2id: 9e3cb244-bdb8-4632-8c90-6079c8f4f16d
 3related:
 4    - id: dbc1f800-0fe0-4bc0-9c66-292c2abe3f78 # ProcCreation schtasks delete
 5      type: similar
 6    - id: 7595ba94-cf3b-4471-aa03-4f6baa9e5fad # Security-Audting Eventlog
 7      type: similar
 8status: test
 9description: |
10        Detects when adversaries try to stop system services or processes by deleting their respective scheduled tasks in order to conduct data destructive activities
11references:
12    - https://www.socinvestigation.com/most-common-windows-event-ids-to-hunt-mind-map/
13author: frack113
14date: 2023-01-13
15modified: 2023-02-07
16tags:
17    - attack.impact
18    - attack.t1489
19logsource:
20    product: windows
21    service: taskscheduler
22    definition: 'Requirements: The "Microsoft-Windows-TaskScheduler/Operational" is disabled by default and needs to be enabled in order for this detection to trigger'
23detection:
24    selection:
25        EventID: 141
26        TaskName|contains:
27            - '\Windows\SystemRestore\SR'
28            - '\Windows\Windows Defender\'
29            - '\Windows\BitLocker'
30            - '\Windows\WindowsBackup\'
31            - '\Windows\WindowsUpdate\'
32            - '\Windows\UpdateOrchestrator\'
33            - '\Windows\ExploitGuard'
34    filter:
35        UserName|contains:
36            - 'AUTHORI'
37            - 'AUTORI'
38    condition: selection and not filter
39falsepositives:
40    - Unknown
41level: high
References
Related rules
- Application Uninstalled
 - Azure Application Deleted
 - Delete All Scheduled Tasks
 - Delete Important Scheduled Task
 - Stop Windows Service Via Net.EXE