Suspicious Scheduled Task Creation to execute LOLbins

Detects command line creation of scheduled tasks using commomly abused LOLbins.

Sigma rule (View on GitHub)

 1title: Suspicious Scheduled Task Creation to execute LOLbins
 2id: e4cae9a5-49a8-46ab-b223-87565b849e64
 3status: experimental
 4description: Detects command line creation of scheduled tasks using commomly abused LOLbins.
 5date: 2021-10-18
 6modified: 2024-02-22
 7author: yatinwad and TheDFIRReport
 8tags:
 9    - attack.persistence
10    - attack.t1053.005
11references:
12    - https://redcanary.com/threat-detection-report/techniques/scheduled-task/
13    - https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/
14logsource:
15    product: windows
16    category: process_creation
17detection:
18    selection:
19      Image|endswith: 'schtasks.exe'
20      CommandLine|contains: '/create '
21    filter_1:
22        CommandLine|contains:
23            - 'regsvr32.exe'
24            - 'rundll32.exe'
25    condition: selection and 1 of filter_*
26falsepositives:
27    - Administrative activity
28    - Software installation
29level: medium

References

Related rules

to-top