Schtasks From Suspicious Folders
Detects scheduled task creations that have suspicious action command and folder combinations
Sigma rule (View on GitHub)
1title: Schtasks From Suspicious Folders
2id: 8a8379b8-780b-4dbf-b1e9-31c8d112fefb
3status: test
4description: Detects scheduled task creations that have suspicious action command and folder combinations
5references:
6 - https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-dream-job-chemical
7author: Florian Roth (Nextron Systems)
8date: 2022-04-15
9modified: 2022-11-18
10tags:
11 - attack.execution
12 - attack.t1053.005
13logsource:
14 product: windows
15 category: process_creation
16detection:
17 selection_img:
18 - Image|endswith: '\schtasks.exe'
19 - OriginalFileName: 'schtasks.exe'
20 selection_create:
21 CommandLine|contains: ' /create '
22 selection_command:
23 CommandLine|contains:
24 - 'powershell'
25 - 'pwsh'
26 - 'cmd /c '
27 - 'cmd /k '
28 - 'cmd /r '
29 - 'cmd.exe /c '
30 - 'cmd.exe /k '
31 - 'cmd.exe /r '
32 selection_all_folders:
33 CommandLine|contains:
34 - 'C:\ProgramData\'
35 - '%ProgramData%'
36 condition: all of selection_*
37falsepositives:
38 - Unknown
39level: high
References
Related rules
- HackTool - Default PowerSploit/Empire Scheduled Task Creation
- Important Scheduled Task Deleted/Disabled
- Kapeka Backdoor Scheduled Task Creation
- Operation Wocao Activity
- Operation Wocao Activity - Security