heroui logo

Schtasks From Suspicious Folders

Sigma Rules

View Source
Summary
This detection rule is designed to identify the creation of scheduled tasks on Windows systems, particularly those executed via 'schtasks.exe', originating from suspicious folder paths or containing potentially malicious command line arguments. The rule searches specifically for the combination of the 'schtasks.exe' execution that includes a command to create new tasks, alongside command line activities that may involve PowerShell, CMD, or similar interpreters, but originating from clearly defined risky directories like 'C:\ProgramData\' or its variable '%%ProgramData%%'. The presence of these patterns could indicate that an attacker is attempting to establish a pathway for executing malicious scripts or commands at scheduled intervals, which is a common tactic used in advanced persistent threats (APTs). The rule is set at a high level of alert, reflecting the seriousness of detecting such behaviors. It is crucial for organizations to monitor for these indicators to prevent unauthorized task creation that could lead to further compromise or data exfiltration.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-04-15