
Summary
This detection rule identifies the creation of temporary files associated with the use of Impacket's `atexec.py` tool, which is commonly employed in post-exploitation scenarios to execute commands on a Windows system via the Task Scheduler. By tracking the file creation events that match specific patterns typical of those created by `atexec.py`, the rule aims to uncover malicious activity linked to remote command execution. The logic utilizes event codes from Windows Event Logs, particularly focusing on actions involving the Task Scheduler and temporary file directories. The rule captures events where files are created in both the `\Windows\System32\Tasks\` and `\Windows\Temp\` directories, specifically looking for files with a `.tmp` extension that adhere to a defined naming pattern. As such, this rule plays a critical role in detecting potential misuse of Task Scheduler by attackers using this tool.
Categories
- Windows
- Endpoint
Data Sources
- File
- Windows Registry
- Process
ATT&CK Techniques
- T1053
- T1059
- T1053.005
- T1059.003
- T1027
Created: 2024-02-09