
Summary
This detection rule identifies suspicious activities related to the creation of scheduled tasks in Windows environments, specifically focusing on the use of XML configurations. The core aim is to detect tasks being created with the '-XML' flag using files that do not have the expected '.xml' file extension. Such behavior is often aligned with tactics aimed at circumventing security mechanisms, potentially signifying an anomaly in task creation which might be used for nefarious purposes like persistence by attackers. The detection strategy encompasses multiple elements, including scrutiny of command-line arguments, image verification of the process being initiated (in this case, schtasks.exe), and checks against integrity levels to filter out legitimate system processes and known third-party applications. The detection's integrity combines various selections (`selection_img`, `selection_cli_create`, etc.) with filters for legitimacy, ensuring that only potentially malicious task creations are flagged. This rule is essential for identifying and mitigating risks associated with scheduled task manipulation in Windows.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2023-04-20