SigmaHQ/rules/windows/sysmon/sysmon_powersploit_schtasks.yml

33 lines
1.0 KiB
YAML
Raw Normal View History

title: Default PowerSploit Schtasks Persistence
status: experimental
description: Detects the creation of a schtask via PowerSploit Default Configuration
references:
- https://github.com/0xdeadbeefJERKY/PowerSploit/blob/8690399ef70d2cad10213575ac67e8fa90ddf7c3/Persistence/Persistence.psm1
author: Markus Neis
date: 2018/03/06
logsource:
product: windows
service: sysmon
detection:
selection:
ParentImage:
- '*\Powershell.exe'
CommandLine:
- '*\schtasks.exe*/Create*/RU*system*/SC*ONLOGON*'
2018-06-23 13:54:31 +00:00
- '*\schtasks.exe*/Create*/RU*system*/SC*DAILY*'
- '*\schtasks.exe*/Create*/RU*system*/SC*ONIDLE*'
- '*\schtasks.exe*/Create*/RU*system*/SC*HOURLY*'
condition: selection
tags:
- attack.execution
- attack.persistence
2019-01-22 18:26:07 +00:00
- attack.privilege_escalation
- attack.t1053
2018-10-10 00:10:37 +00:00
- attack.t1086
- attack.s0111
- attack.g0022
- attack.g0060
falsepositives:
- False positives are possible, depends on organisation and processes
level: high