EXPLORE
← Back to Explore
sigmahighHunting

Taskmgr as LOCAL_SYSTEM

Detects the creation of taskmgr.exe process in context of LOCAL_SYSTEM

MITRE ATT&CK

Detection Query

selection:
  User|contains:
    - AUTHORI
    - AUTORI
  Image|endswith: \taskmgr.exe
condition: selection

Author

Florian Roth (Nextron Systems)

Created

2018-03-18

Data Sources

windowsProcess Creation Events

Platforms

windows

Tags

attack.stealthattack.t1036
Raw Content
title: Taskmgr as LOCAL_SYSTEM
id: 9fff585c-c33e-4a86-b3cd-39312079a65f
status: test
description: Detects the creation of taskmgr.exe process in context of LOCAL_SYSTEM
references:
    - Internal Research
author: Florian Roth (Nextron Systems)
date: 2018-03-18
modified: 2022-05-27
tags:
    - attack.stealth
    - attack.t1036
logsource:
    category: process_creation
    product: windows
detection:
    selection:
        User|contains: # covers many language settings
            - 'AUTHORI'
            - 'AUTORI'
        Image|endswith: '\taskmgr.exe'
    condition: selection
falsepositives:
    - Unknown
level: high