heroui logo

Windows Scheduled Task DLL Module Loaded

Splunk Security Content

View Source
Summary
This detection rule identifies potentially malicious behavior associated with the loading of the taskschd.dll module by processes that reside in suspicious or writable directories. Legitimate software typically loads this DLL from protected directories, so any instances where it is loaded from unconventional paths, such as user directories or temporary folders, could indicate an attempt by malware to manipulate the Windows Task Scheduler for unauthorized task execution. The detection leverages Sysmon's Event ID 7, which logs when a process loads a DLL, along with specific conditions filtering for known questionable paths. Effective implementation requires Sysmon logs and adherence to specific configurations for accurate identification of threats without generating excessive false positives from legitimate applications.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1053
Created: 2024-11-13