heroui logo

Remote Scheduled Task Creation

Elastic Detection Rules

View Source
Summary
The "Remote Scheduled Task Creation" rule identifies the creation of scheduled tasks on a target Windows host, which potentially indicates lateral movement by adversaries. Scheduled tasks are a legitimate Windows feature, often utilized for automation but can be exploited by attackers to maintain persistence and execute malicious activities. This detection is implemented using an EQL (Event Query Language) query that monitors for incoming network connections from port ranges typically used for dynamic connections, followed closely by changes in the Windows registry where scheduled tasks are configured. Investigative steps involve analyzing the base64 encoded values of the registry entries related to scheduled tasks to ascertain their intent, validating the legitimacy of the task against known benign activities, and reviewing logs from involved machines. Given that scheduled tasks can be used for both legitimate management and malicious purposes, false positives are common, necessitating thorough context analysis before concluding suspicious activity. The rule corresponds with specific MITRE ATT&CK techniques such as Remote Services (T1021) and Scheduled Task/Job (T1053).
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Network Traffic
  • Logon Session
ATT&CK Techniques
  • T1021
  • T1053
  • T1053.005
Created: 2020-11-20