mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-08 18:23:52 +00:00
36 lines
1.1 KiB
YAML
36 lines
1.1 KiB
YAML
title: Tasks Folder Evasion
|
|
id: cc4e02ba-9c06-48e2-b09e-2500cace9ae0
|
|
status: experimental
|
|
description: The Tasks folder in system32 and syswow64 are globally writable paths. Adversaries can take advantage of this and load or influence any script hosts or ANY .NET Application in Tasks to load and execute a custom assembly into cscript, wscript, regsvr32, mshta, eventvwr
|
|
references:
|
|
- https://twitter.com/subTee/status/1216465628946563073
|
|
- https://gist.github.com/am0nsec/8378da08f848424e4ab0cc5b317fdd26
|
|
date: 2020/01/13
|
|
author: Sreeman
|
|
tags:
|
|
- attack.t1064
|
|
- attack.t1211
|
|
- attack.t1059
|
|
- attack.defense_evasion
|
|
- attack.persistence
|
|
logsource:
|
|
product: Windows
|
|
detection:
|
|
selection1:
|
|
CommandLine|contains:
|
|
- 'echo '
|
|
- 'copy '
|
|
- 'type '
|
|
- 'file createnew'
|
|
selection2:
|
|
CommandLine|contains:
|
|
- ' C:\Windows\System32\Tasks\'
|
|
- ' C:\Windows\SysWow64\Tasks\'
|
|
condition: selection1 and selection2
|
|
fields:
|
|
- CommandLine
|
|
- ParentProcess
|
|
falsepositives:
|
|
- Unknown
|
|
level: high
|