EXPLORE
← Back to Explore
sigmalowHunting

Scheduled Task Created - Registry

Detects the creation of a scheduled task via Registry keys.

MITRE ATT&CK

executionpersistenceprivilege-escalation

Detection Query

selection:
  TargetObject|contains:
    - \Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\
    - \Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\
condition: selection

Author

Center for Threat Informed Defense (CTID) Summiting the Pyramid Team

Created

2023-09-27

Data Sources

windowsRegistry Events

Platforms

windows

Tags

attack.executionattack.persistenceattack.privilege-escalationattack.s0111attack.t1053.005car.2013-08-001detection.threat-hunting
Raw Content
title: Scheduled Task Created - Registry
id: 93ff0ceb-e0ef-4586-8cd8-a6c277d738e3
status: test
description: Detects the creation of a scheduled task via Registry keys.
references:
    - https://center-for-threat-informed-defense.github.io/summiting-the-pyramid/analytics/task_scheduling/
    - https://posts.specterops.io/abstracting-scheduled-tasks-3b6451f6a1c5
author: Center for Threat Informed Defense (CTID) Summiting the Pyramid Team
date: 2023-09-27
tags:
    - attack.execution
    - attack.persistence
    - attack.privilege-escalation
    - attack.s0111
    - attack.t1053.005
    - car.2013-08-001
    - detection.threat-hunting
logsource:
    product: windows
    category: registry_event
detection:
    selection:
        TargetObject|contains:
            - '\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\'
            - '\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\'
    condition: selection
falsepositives:
    - Likely as this is a normal behaviour on Windows
level: low