Suspicious Scheduled Task Creation Involving Temp Folder
Detects the creation of scheduled tasks that involves a temporary folder and runs only once
Sigma rule (View on GitHub)
1title: Suspicious Scheduled Task Creation Involving Temp Folder
2id: 39019a4e-317f-4ce3-ae63-309a8c6b53c5
3status: test
4description: Detects the creation of scheduled tasks that involves a temporary folder and runs only once
5references:
6 - https://discuss.elastic.co/t/detection-and-response-for-hafnium-activity/266289/3
7author: Florian Roth (Nextron Systems)
8date: 2021-03-11
9modified: 2022-10-09
10tags:
11 - attack.execution
12 - attack.persistence
13 - attack.t1053.005
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection:
19 Image|endswith: '\schtasks.exe'
20 CommandLine|contains|all:
21 - ' /create '
22 - ' /sc once '
23 - '\Temp\'
24 condition: selection
25falsepositives:
26 - Administrative activity
27 - Software installation
28level: high
References
Related rules
- HackTool - Default PowerSploit/Empire Scheduled Task Creation
- Important Scheduled Task Deleted/Disabled
- Kapeka Backdoor Scheduled Task Creation
- Potential Persistence Via Powershell Search Order Hijacking - Task
- Scheduled Task Creation Via Schtasks.EXE