heroui logo

Local Scheduled Task Creation

Elastic Detection Rules

View Source
Summary
The rule 'Local Scheduled Task Creation' detects the creation of scheduled tasks in Windows environments, a method often exploited by attackers to establish persistence, escalate privileges, or facilitate lateral movement within the network. Featuring an EQL query, this rule monitors for specific process activity associated with task creation, particularly those initiated by non-system users. The rule uses a sequence of events to identify suspicious behaviors, such as the invocation of command-line tools like 'schtasks.exe'. The detection logic excludes legitimate system-level operations, focusing instead on non-standard task creation behaviors. False positives can arise from legitimate scheduled tasks; thus, users are advised to establish whitelists and thorough investigation protocols to differentiate between benign and malicious activities. The rule links back to the MITRE ATT&CK framework, primarily covering the persistence tactic associated with the technique of scheduled task creation, ensuring a comprehensive approach to threat detection and response within Windows environments.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1053
  • T1053.005
Created: 2020-02-18