Suspicious Scheduled Task Creation Involving Temp Folder
Detects the creation of scheduled tasks that involves a temporary folder and runs only once
Sigma rule (View on GitHub)
 1title: Suspicious Scheduled Task Creation Involving Temp Folder
 2id: 39019a4e-317f-4ce3-ae63-309a8c6b53c5
 3status: test
 4description: Detects the creation of scheduled tasks that involves a temporary folder and runs only once
 5references:
 6    - https://discuss.elastic.co/t/detection-and-response-for-hafnium-activity/266289/3
 7author: Florian Roth (Nextron Systems)
 8date: 2021-03-11
 9modified: 2022-10-09
10tags:
11    - attack.privilege-escalation
12    - attack.execution
13    - attack.persistence
14    - attack.t1053.005
15logsource:
16    category: process_creation
17    product: windows
18detection:
19    selection:
20        Image|endswith: '\schtasks.exe'
21        CommandLine|contains|all:
22            - ' /create '
23            - ' /sc once '
24            - '\Temp\'
25    condition: selection
26falsepositives:
27    - Administrative activity
28    - Software installation
29level: high
References
Related rules
- ChromeLoader Malware Execution
- Defrag Deactivation
- Kapeka Backdoor Persistence Activity
- OilRig APT Activity
- OilRig APT Registry Persistence
