
Summary
The 'Suspicious Scheduled Task Update' rule is designed to detect potentially malicious alterations to Windows Scheduled Tasks that include specific keywords associated with known executables and common directories used by attackers to store temporary files or scripts. It is particularly focused on detecting updates to Scheduled Tasks where the task's content includes paths that are often exploited, such as directories that may house malware or scripts in locations like \AppData\Local\Temp\ or \Users\Public\. The detection logic is based on monitoring Windows Security events, specifically EventID 4702, which signifies an update to a scheduled task. By checking for command execution indicators such as 'regsvr32', 'cmd.exe', and 'powershell', as well as the presence of certain directories in the task path, the rule aims to flag operations that may indicate an attacker is trying to establish persistence or escalate privileges. To effectively use this rule, organizations must ensure that their audit policies are properly configured to capture these events, particularly 'Audit Other Object Access Events'.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Application Log
Created: 2022-12-05