heroui logo

Scheduled Task Execution at Scale via GPO

Elastic Detection Rules

View Source
Summary
This rule detects unauthorized modifications to Group Policy Object (GPO) attributes, which may indicate that attackers are trying to execute scheduled tasks on multiple systems controlled by a GPO. The detection primarily focuses on specific event codes related to changes in GPO attributes (codes 5136 and 5145), particularly looking for indicators that reveal malicious activity involving `ScheduledTasks.xml` files within the SYSVOL directory. Security analysts must investigate the legitimacy of this activity, as GPO modifications can be part of normal administrative functions. However, if changes appear suspicious or are not authorized, this could be a critical sign of potential system compromise. The rule also includes guidance for triaging alerts, analyzing potential false positives, and conducting thorough investigations into affected systems to inform the incident response process.
Categories
  • Endpoint
  • Windows
  • Identity Management
Data Sources
  • Active Directory
  • Windows Registry
  • Logon Session
ATT&CK Techniques
  • T1053
  • T1053.005
  • T1484
  • T1484.001
  • T1570
Created: 2021-11-08