SigmaHQ/rules/windows/other/win_rare_schtask_creation.yml

23 lines
687 B
YAML
Raw Normal View History

2017-03-17 07:41:27 +00:00
title: Rare Scheduled Task Creations
2019-11-12 22:12:27 +00:00
id: b20f6158-9438-41be-83da-a5a16ac90c2b
2017-03-17 07:41:27 +00:00
status: experimental
2020-06-16 20:46:08 +00:00
description: This rule detects rare scheduled task creations. Typically software gets installed on multiple systems and not only on a few. The aggregation and count function selects tasks with rare names.
tags:
- attack.persistence
- attack.t1053 # an old one
- attack.s0111
2020-06-16 20:46:08 +00:00
- attack.t1053.005
2017-03-17 07:41:27 +00:00
author: Florian Roth
date: 2017/03/17
2017-03-17 07:41:27 +00:00
logsource:
product: windows
service: taskscheduler
2017-03-17 07:41:27 +00:00
detection:
selection:
EventID: 106
timeframe: 7d
condition: selection | count() by TaskName < 5
2017-03-17 07:41:27 +00:00
falsepositives:
- Software installation
level: low