
Summary
This detection rule monitors the execution of Scheduled Tasks initiated from suspicious locations on Windows systems. It specifically focuses on identifying instances where the program associated with the Scheduled Task is executed from common temporary directories such as 'C:\Windows\Temp\', 'C:\Users\<username>\AppData\Local\Temp\', or other user-accessible areas like 'C:\Desktop\' and 'C:\Downloads\'. The rule works by examining Event ID 129 from the 'Microsoft-Windows-TaskScheduler/Operational' log, which must be enabled to trigger the detection. The underlying premise of this detection is that malicious actors often leverage Scheduled Tasks to execute payloads discreetly from unexpected or insecure locations, which can be indicative of persistence mechanisms employed during an attack. Thus, the detection serves as a means to flag potentially illicit use of the task scheduling feature within the Windows operating environment, allowing for timely investigation and response by security teams.
Categories
- Windows
- Endpoint
Data Sources
- Scheduled Job
- Logon Session
- Application Log
Created: 2022-12-05