
Summary
This detection rule identifies the use of the `schtasks.exe` command to create scheduled tasks on remote systems, which is often indicative of lateral movement or the execution of remote code by potential adversaries. By monitoring specific command-line arguments and leveraging data sourced from various endpoint telemetry, particularly from Endpoint Detection and Response (EDR) agents, the rule effectively highlights instances where the `schtasks.exe` process is invoked with potential malicious intent. This behavior can compromise network security, allowing unauthorized access or the execution of arbitrary commands, thus posing a significant threat to organizational integrity. The detection criteria not only cover the `schtasks.exe` process name but also include detailed characteristics of the command line used for task creation, ensuring a comprehensive approach to identifying risks associated with remote task scheduling.
Categories
- Endpoint
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1053.005
- T1053
Created: 2024-12-10