
Summary
This detection rule identifies a significant security anomaly where an Office document creates a scheduled task using a malicious macro, specifically through the loading of `taskschd.dll`. Leveraging Sysmon's EventCode 7, the rule highlights activity where various Office applications (like Excel, Word, Access, etc.) load this specific DLL, which is a common behavior seen in macro-driven malware aiming to establish persistence or execute commands. If such behavior is detected, it indicates a potential attack vector where an adversary may maintain ongoing access and execute arbitrary code on the affected machine, compounding the risk to the organization's cybersecurity posture. Proper implementation of this rule requires Sysmon logging and careful monitoring to effectively filter out false positives from legitimate activities that could also fire this alert.
Categories
- Endpoint
Data Sources
- Pod
- Container
- User Account
- Windows Registry
- Script
ATT&CK Techniques
- T1566
- T1566.001
Created: 2025-01-20