heroui logo

Suspicious Scheduled Task from Public Directory

Splunk Security Content

View Source
Summary
This analytic rule detects the creation of scheduled tasks that run executables or scripts from public directories (e.g., `C:\Users\Public`, `C:\ProgramData`, or `C:\Windows\Temp`) using the command-line tool `schtasks.exe` with its `/create` argument. Leveraging Sysmon Event ID 1 data, this detection identifies potentially malicious activities indicative of persistence mechanisms or possible execution of harmful scripts, commonly associated with malware behaviors. If validated as malicious, such activities could lead to data breaches, unauthorized access, and lateral movement threats within enterprise networks. The detection process is implemented through evidence from multiple data sources including Sysmon and Windows Event Logs, and it leverages Splunk's powerful data querying capabilities for analysis.
Categories
  • Endpoint
Data Sources
  • Scheduled Job
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1053
  • T1053.005
Created: 2025-01-27