
Summary
This detection rule targets the potential abuse of scheduled jobs in Windows operating systems as a form of persistence by adversaries. Such jobs, when created, allow executing malicious programs or scripts at specified times, which attackers may leverage for maintaining access to a compromised system. The rule relies on inspecting Windows Task Scheduler job files in the `C:\Windows\Tasks\` directory and excludes known legitimate job paths associated with trusted applications such as CCleaner and ManageEngine. The EQL (Event Query Language) query checks for file creations in the `.job` format while ensuring that non-malicious tasks do not trigger alerts. It emphasizes the importance of careful monitoring of scheduled job creation to detect potentially malicious activities while minimizing false positives.
Categories
- Endpoint
- Windows
Data Sources
- File
- Windows Registry
- Process
ATT&CK Techniques
- T1053
- T1053.005
Created: 2021-03-15