
Summary
The Windows PowerShell ScheduleTask rule is designed to detect potentially malicious activities involving PowerShell's task scheduling cmdlets, specifically monitoring for commands like 'New-ScheduledTask' and 'Set-ScheduledTask'. These cmdlets are often used by attackers to establish persistence or execute malicious tasks remotely. The detection leverages PowerShell Script Block Logging (EventCode 4104), enabling it to capture and analyze script block text for suspicious patterns. The implementation of this rule is critical as it can lead to serious threats, including data theft or the deployment of ransomware if not addressed promptly. Organizations are advised to investigate any alerts generated by this rule immediately to prevent exploitation of their systems. The rule may generate false positives due to legitimate administrative use of PowerShell, so understanding typical system behavior is essential for tuning and minimizing alerts.
Categories
- Endpoint
- Windows
Data Sources
- Pod
- Process
- Logon Session
- Application Log
- Windows Registry
ATT&CK Techniques
- T1053.005
- T1059.001
- T1059
Created: 2024-11-13