heroui logo

Suspicious Command Patterns In Scheduled Task Creation

Sigma Rules

View Source
Summary
This detection rule aims to identify potentially malicious activity related to the creation of scheduled tasks on Windows systems using the 'schtasks.exe' command. It targets specific command patterns that appear suspicious or uncommon, which may indicate an attempt to execute nefarious scripts or commands. The rule triggers on instances where 'schtasks.exe' is used with the '/Create' parameter, especially if it subsequently involves executing commands that typically suggest automation for harmful purposes. This includes common Windows scripting tools and techniques, such as 'cmd' commands and suspicious combinations of directory paths related to temporary or public directories, which are often exploited to hide malicious activity. False positives may occur from legitimate software that generates scheduled tasks for automated updates or installations, particularly when run from temporary folders. The rule utilizes a structured selection process to ensure accuracy in detecting potential security threats while aiming to minimize impactful false alarms.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-02-23