
Summary
The detection rule identifies the use of 'schtasks.exe' to create or run Scheduled Tasks on remote endpoints, utilizing various endpoint security log sources including Sysmon, Windows Event Logs, and CrowdStrike data. This behavior is notable as it can indicate potential lateral movement and remote code execution activities by threat actors aiming to compromise the network further. By focusing on the process name and command-line arguments of the 'schtasks.exe' execution, the rule captures suspicious attempts made either through direct command-line interaction or automation scripts that execute admin tasks on remote machines. The detection builds on the premise that legitimate administrative use is generally confined to specific hosts and users, but wide or unexpected usage may be indicative of malicious activity. This rule is implemented within the Splunk ecosystem, leveraging the Common Information Model (CIM) for effective log normalization and analysis.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1053
- T1053.005
Created: 2024-11-13