← Back to Explore
sigmahighHunting
Taskmgr as LOCAL_SYSTEM
Detects the creation of taskmgr.exe process in context of LOCAL_SYSTEM
MITRE ATT&CK
Detection Query
selection:
User|contains:
- AUTHORI
- AUTORI
Image|endswith: \taskmgr.exe
condition: selection
Author
Florian Roth (Nextron Systems)
Created
2018-03-18
Data Sources
windowsProcess Creation Events
Platforms
windows
References
Tags
attack.stealthattack.t1036
Raw Content
title: Taskmgr as LOCAL_SYSTEM
id: 9fff585c-c33e-4a86-b3cd-39312079a65f
status: test
description: Detects the creation of taskmgr.exe process in context of LOCAL_SYSTEM
references:
- Internal Research
author: Florian Roth (Nextron Systems)
date: 2018-03-18
modified: 2022-05-27
tags:
- attack.stealth
- attack.t1036
logsource:
category: process_creation
product: windows
detection:
selection:
User|contains: # covers many language settings
- 'AUTHORI'
- 'AUTORI'
Image|endswith: '\taskmgr.exe'
condition: selection
falsepositives:
- Unknown
level: high