Schtasks From Suspicious Folders
Detects scheduled task creations that have suspicious action command and folder combinations
Sigma rule (View on GitHub)
1title: Schtasks From Suspicious Folders
2id: 8a8379b8-780b-4dbf-b1e9-31c8d112fefb
3status: test
4description: Detects scheduled task creations that have suspicious action command and folder combinations
5references:
6 - https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-dream-job-chemical
7author: Florian Roth (Nextron Systems)
8date: 2022-04-15
9modified: 2022-11-18
10tags:
11 - attack.privilege-escalation
12 - attack.persistence
13 - attack.execution
14 - attack.t1053.005
15logsource:
16 product: windows
17 category: process_creation
18detection:
19 selection_img:
20 - Image|endswith: '\schtasks.exe'
21 - OriginalFileName: 'schtasks.exe'
22 selection_create:
23 CommandLine|contains: ' /create '
24 selection_command:
25 CommandLine|contains:
26 - 'powershell'
27 - 'pwsh'
28 - 'cmd /c '
29 - 'cmd /k '
30 - 'cmd /r '
31 - 'cmd.exe /c '
32 - 'cmd.exe /k '
33 - 'cmd.exe /r '
34 selection_all_folders:
35 CommandLine|contains:
36 - 'C:\ProgramData\'
37 - '%ProgramData%'
38 condition: all of selection_*
39falsepositives:
40 - Unknown
41level: high
References
Related rules
- ChromeLoader Malware Execution
- Defrag Deactivation
- Kapeka Backdoor Persistence Activity
- OilRig APT Activity
- OilRig APT Registry Persistence