heroui logo

Impacket atexec.py Scheduled Task Creation

Anvilogic Forge

View Source
Summary
The rule focuses on detecting the creation of scheduled tasks on Windows systems utilizing Impacket's atexec.py, a tool commonly exploited by attackers for remote code execution. Scheduled tasks created by this tool have distinctive characteristics: they usually contain command execution patterns and feature an 8-character mixed-case alpha-numeric task name. The detection logic uses Windows event logs, particularly Event ID 4698, to identify when a new task is created. The logic filters tasks that contain command execution indicators (e.g., 'exec', '/C'), checks for task names matching the regular expression for an 8-character format, and aggregates relevant data points such as the time of creation, host, user, and task name. By highlighting these specific attributes, the rule aims to capture potential malicious activity leveraging scheduled tasks for persistence or privilege escalation during post-exploitation phases.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Scheduled Job
  • Application Log
ATT&CK Techniques
  • T1053
  • T1059
  • T1053.005
  • T1059.003
  • T1027
Created: 2024-03-28