
Summary
This detection rule identifies instances where the Windows Task Scheduler service (svchost.exe with specific parameters) spawns various command line and script execution binaries such as PowerShell, CMD, and others. By analyzing endpoint telemetry obtained through Endpoint Detection and Response (EDR) agents, the rule looks into relationships between parent and child processes to detect potential abuse of legitimate processes. Such techniques are often leveraged by attackers for persistence, privilege escalation, or to execute arbitrary code in a targeted environment. The focus is on the command line execution patterns that are indicative of malicious behavior, specifically in relation to scheduled tasks, making it crucial for identifying threat actors who misuse this functionality to maintain their foothold in a network environment.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1053
- T1053.005
- T1059
Created: 2024-11-13