← Back to Explore
sigmalowHunting
Scheduled Task Created - Registry
Detects the creation of a scheduled task via Registry keys.
Detection Query
selection:
TargetObject|contains:
- \Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\
- \Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\
condition: selection
Author
Center for Threat Informed Defense (CTID) Summiting the Pyramid Team
Created
2023-09-27
Data Sources
windowsRegistry Events
Platforms
windows
References
Tags
attack.executionattack.persistenceattack.privilege-escalationattack.s0111attack.t1053.005car.2013-08-001detection.threat-hunting
Raw Content
title: Scheduled Task Created - Registry
id: 93ff0ceb-e0ef-4586-8cd8-a6c277d738e3
status: test
description: Detects the creation of a scheduled task via Registry keys.
references:
- https://center-for-threat-informed-defense.github.io/summiting-the-pyramid/analytics/task_scheduling/
- https://posts.specterops.io/abstracting-scheduled-tasks-3b6451f6a1c5
author: Center for Threat Informed Defense (CTID) Summiting the Pyramid Team
date: 2023-09-27
tags:
- attack.execution
- attack.persistence
- attack.privilege-escalation
- attack.s0111
- attack.t1053.005
- car.2013-08-001
- detection.threat-hunting
logsource:
product: windows
category: registry_event
detection:
selection:
TargetObject|contains:
- '\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\'
- '\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\'
condition: selection
falsepositives:
- Likely as this is a normal behaviour on Windows
level: low