SigmaHQ/rules/windows/builtin/win_rare_schtasks_creations.yml

26 lines
977 B
YAML
Raw Normal View History

2018-01-27 09:57:30 +00:00
title: Rare Schtasks Creations
2019-11-12 22:12:27 +00:00
id: b0d77106-7bb0-41fe-bd94-d1752164d066
2020-03-14 18:58:58 +00:00
description: Detects rare scheduled tasks creations that only appear a few times per time frame and could reveal password dumpers, backdoor installs or other types of malicious code
2017-03-23 10:45:10 +00:00
status: experimental
author: Florian Roth
date: 2017/03/23
2018-07-24 05:50:32 +00:00
tags:
- attack.execution
- attack.privilege_escalation
- attack.persistence
- attack.t1053
2019-06-14 04:15:38 +00:00
- car.2013-08-001
2017-03-23 10:45:10 +00:00
logsource:
product: windows
service: security
definition: 'The Advanced Audit Policy setting Object Access > Audit Other Object Access Events has to be configured to allow this detection (not in the baseline recommendations by Microsoft). We also recommend extracting the Command field from the embedded XML in the event data.'
2017-03-23 10:45:10 +00:00
detection:
selection:
EventID: 4698
2017-03-23 10:45:10 +00:00
timeframe: 7d
condition: selection | count() by TaskName < 5
falsepositives:
2017-03-23 10:45:10 +00:00
- Software installation
- Software updates
level: low