heroui logo

A scheduled task was created

Elastic Detection Rules

View Source
Summary
This detection rule identifies the creation of scheduled tasks on Windows systems using Windows event logs, which adversaries may exploit for establishing persistence, lateral movement, or privilege escalation. The rule specifically looks for event actions related to scheduled task creations while filtering out benign actions associated with system and commonly used applications like those from Hewlett-Packard or Microsoft Visual Studio. These benign tasks are excluded by their specific names, thereby focusing the detection on potentially malicious activities. The rule has a risk score of 21, indicating a low level of risk, and is pertinent for analysts investigating potential unauthorized system alterations. The analysis involves reviewing the user account responsible for creating the task, verifying the legitimacy of the task name, examining the origin of task creation, and correlating the event with other security logs. In cases of detection, immediate responses include isolating the affected system, terminating suspicious tasks, and reviewing for further unauthorized activities.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Application Log
  • Logon Session
  • Process
ATT&CK Techniques
  • T1053
  • T1053.005
Created: 2022-08-29