heroui logo

Persistence via Scheduled Job Creation

Elastic Detection Rules

View Source
Summary
This detection rule targets the potential abuse of scheduled jobs in Windows operating systems as a form of persistence by adversaries. Such jobs, when created, allow executing malicious programs or scripts at specified times, which attackers may leverage for maintaining access to a compromised system. The rule relies on inspecting Windows Task Scheduler job files in the `C:\Windows\Tasks\` directory and excludes known legitimate job paths associated with trusted applications such as CCleaner and ManageEngine. The EQL (Event Query Language) query checks for file creations in the `.job` format while ensuring that non-malicious tasks do not trigger alerts. It emphasizes the importance of careful monitoring of scheduled job creation to detect potentially malicious activities while minimizing false positives.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1053
  • T1053.005
Created: 2021-03-15