heroui logo

Scheduled Task Creation with Curl and PowerShell Execution Combo

Sigma Rules

View Source
Summary
This rule identifies the creation of scheduled tasks on Windows systems using the `schtasks.exe` tool, which may be used by attackers to execute commands or scripts maliciously. The detection focuses on scenarios where `curl` is employed to download potentially harmful payloads from the internet and `PowerShell` is utilized to execute these fetched scripts or commands. This combination allows for the execution and persistence of malicious actions without directly placing malware on the host system, thus evading conventional security measures. The rule monitors the command lines associated with the process creation events, ensuring that the execution context matches the suspicious behaviors typically associated with malware persistence and command-and-control activity. False positives are taken into account, as legitimate administrative tasks may invoke similar commands in a controlled environment, demanding careful tuning for accurate threat detection.
Categories
  • Endpoint
  • Windows
  • Cloud
Data Sources
  • Process
Created: 2025-02-05