
Summary
This detection rule focuses on identifying potentially malicious scheduled task creations or modifications that are executed with high privileges under suspicious schedule types in a Windows environment. It specifically monitors the execution of the 'schtasks.exe' utility, which is often used for scheduling tasks on Windows systems. The rule captures commands that specify schedule types such as ONLOGON, ONSTART, ONCE, and ONIDLE, which may be indicators of unusual behavior when combined with high privilege levels like SYSTEM or HIGHEST. As attackers may leverage these high-privilege scheduled tasks to maintain persistence or execute arbitrary code, this rule aims to provide early detection and alert security teams of potential threats.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2022-08-31