← Back to Explore
sigmalowHunting
Scheduled Task Created - FileCreation
Detects the creation of a scheduled task via file creation.
Detection Query
selection:
TargetFilename|contains:
- :\Windows\System32\Tasks\
- :\Windows\SysWOW64\Tasks\
- :\Windows\Tasks\
condition: selection
Author
Center for Threat Informed Defense (CTID) Summiting the Pyramid Team
Created
2023-09-27
Data Sources
windowsFile Events
Platforms
windows
References
Tags
attack.executionattack.persistenceattack.privilege-escalationattack.t1053.005attack.s0111car.2013-08-001detection.threat-hunting
Raw Content
title: Scheduled Task Created - FileCreation
id: a762e74f-4dce-477c-b023-4ed81df600f9
status: test
description: Detects the creation of a scheduled task via file creation.
references:
- https://center-for-threat-informed-defense.github.io/summiting-the-pyramid/analytics/task_scheduling/
- https://posts.specterops.io/abstracting-scheduled-tasks-3b6451f6a1c5
author: Center for Threat Informed Defense (CTID) Summiting the Pyramid Team
date: 2023-09-27
tags:
- attack.execution
- attack.persistence
- attack.privilege-escalation
- attack.t1053.005
- attack.s0111
- car.2013-08-001
- detection.threat-hunting
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|contains:
- ':\Windows\System32\Tasks\'
- ':\Windows\SysWOW64\Tasks\'
- ':\Windows\Tasks\'
condition: selection
falsepositives:
- Normal behaviour on Windows
level: low