SigmaHQ/rules/windows/sysmon/sysmon_susp_schtask_creation.yml
2017-03-13 20:45:28 +01:00

19 lines
590 B
YAML

title: Scheduled Task Creation
status: experimental
description: "Detetcs a Powershell process that opens network connections - check for suspicious target ports and target systems - adjust to your environment (e.g. extend filters with company's ip range')"
author: Florian Roth
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 1
Image: '*\schtasks.exe'
CommandLine: '* /create *'
filter:
User: 'NT AUTHORITY\SYSTEM'
condition: selection and not filter
falsepositives:
- Administrative activity
level: low