
Summary
This detection rule identifies suspicious uses of the `taskschd.dll` library in Microsoft Office processes, which may indicate malicious activity. Attackers often exploit Microsoft Office due to its widespread use in corporate environments, utilizing documents to deliver malware or conduct phishing attempts. The `taskschd.dll` library, responsible for providing COM interfaces to manage scheduled tasks, can be loaded by Office applications to execute adversarial tactics without triggering traditional monitoring systems. The rule monitors for the loading of this DLL by processes like WINWORD.EXE, EXCEL.EXE, and others, which may signify an attempt to create a scheduled task for persistence or further execution of malicious activities. It recommends several investigative steps to analyze scheduled tasks and associated behaviors, including examining network connections and monitoring any abnormal actions during the alert timeframe. The rule emphasizes the importance of thorough investigation to determine the legitimacy of the detected activity, highlighting best practices in incident response and remediation when addressing security threats related to Microsoft Office usage.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Image
- Logon Session
- Application Log
ATT&CK Techniques
- T1053
- T1053.005
Created: 2020-11-17