heroui logo

Windows Scheduled Task with Highest Privileges

Splunk Security Content

View Source
Summary
This detection rule identifies potentially malicious activity involving the creation of Windows Scheduled Tasks configured to run with the highest privileges. Using Sysmon and Windows Event Log data, the rule specifically targets executions of `schtasks.exe` that use the `/rl` and `highest` command-line parameters. This is significant in the context of persistent threats where adversaries, such as those utilizing AsyncRAT, maintain access and escalate their privileges for malicious purposes. Endpoint Detection and Response (EDR) logs are critical in capturing this activity, and when such tasks are observed, it indicates a serious security risk, as attackers may gain unauthorized system access.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Logon Session
  • Application Log
ATT&CK Techniques
  • T1053
  • T1053.005
Created: 2024-12-10