heroui logo

Scheduled TaskCache Change by Uncommon Program

Sigma Rules

View Source
Summary
This detection rule monitors for the creation of new registry keys under the 'TaskCache' of Windows Scheduled Tasks. It specifically looks for these changes initiated by processes that are not 'svchost.exe', which could indicate potentially malicious activity. Uncommon programs triggering task cache modifications may align with persistence mechanisms employed by attackers, such as ransomware or other forms of malware. The rule includes filters for certain legitimate processes like 'TiWorker.exe', 'msiexec.exe', and several Microsoft Office-related executables to reduce false positives related to regular system operations. This is critical to ensure that the alerting focuses on genuinely suspicious activities, thereby improving the security posture against task manipulation attacks. The rule has a high severity level and should be used in conjunction with other monitoring tools to provide a holistic view of system activities related to task scheduling.
Categories
  • Windows
  • Endpoint
  • Infrastructure
Data Sources
  • Windows Registry
Created: 2021-06-18