SigmaHQ/rules/windows/other/win_rare_schtask_creation.yml
2020-01-30 16:07:37 +01:00

23 lines
645 B
YAML

title: Rare Scheduled Task Creations
id: b20f6158-9438-41be-83da-a5a16ac90c2b
status: experimental
description: This rule detects rare scheduled task creations. Typically software gets installed on multiple systems and not only on a few. The aggregation and count
function selects tasks with rare names.
tags:
- attack.persistence
- attack.t1053
- attack.s0111
author: Florian Roth
date: 2017/03/17
logsource:
product: windows
service: taskscheduler
detection:
selection:
EventID: 106
timeframe: 7d
condition: selection | count() by TaskName < 5
falsepositives:
- Software installation
level: low