
Summary
The Interactive AT Job rule is designed to detect instances of the interactive use of the AT command in Windows environments, which can be a method for attackers to escalate privileges on a compromised system. The AT command, particularly when executed with the 'interactive' option, allows scheduled tasks to interact with the desktop of the user, potentially enabling an attacker to take over user sessions or escalate privileges. This type of detection is crucial for monitoring and mitigating privilege escalation attacks, especially in environments transitioning from older versions of Windows where AT was more commonly used. The detection rule looks for process creation events where the image name ends with 'at.exe' and the command line contains the word 'interactive'. Given that 'at.exe' has been deprecated in Windows 8 and later, false positives are unlikely, but detection remains significant due to compatibility with legacy systems. The references provided offer detailed insights into the specifics of the attack technique and related defenses.
Categories
- Windows
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1053.002
Created: 2019-10-24