
Summary
This analytic rule targets the detection of potentially malicious scheduled tasks on Windows systems by monitoring Windows Security Event Logs, specifically Event Codes 4698, 4700, and 4702. This activity detection focuses on tasks that are created, modified, or enabled using task names known to be suspicious or associated with malicious behavior. Such detection is critical as it indicates an attacker's attempt to establish persistence on a system, execute harmful commands, or maintain access to the environment. The detection workflow involves evaluating the task content for known suspicious task names, inferring potential malicious intent. A successful match could suggest escalated privileges, execution of arbitrary code, or other threats, thereby underscoring the importance of monitoring scheduled tasks for security purposes.
Categories
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1053
- T1053.005
Created: 2025-02-07