
Summary
The rule 'Suspicious Execution via Scheduled Task' is designed to detect potential malicious activities on Windows endpoints by analyzing process lineage and command line arguments related to scheduled tasks. This rule specifically looks for instances where processes, indicative of potentially harmful behavior, are initiated by the 'svchost.exe' service with 'Schedule' as part of their command line arguments. It employs a comprehensive query to identify known suspicious executables (such as 'Cscript.exe', 'PowerShell.EXE', and 'msiexec.exe') and unusual file paths often associated with malicious activities. False positives may arise from legitimate scheduled tasks running benign software, such as third-party applications, necessitating careful examination of the detected processes. Notably, the rule provides various investigation and response steps to aid in analyzing flagged events, assessing the risk and potential impact, as well as taking necessary remediation actions like isolating affected systems and reviewing scheduled tasks for unauthorized entries.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Logon Session
ATT&CK Techniques
- T1053
- T1053.005
Created: 2020-11-19