EXPLORE
← Back to Explore
T1053.005

Scheduled Task

Adversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malicious code. There are multiple ways to access the Task Scheduler in Windows. The [schtasks](https://attack.mitre.org/software/S0111) utility can be run directly on the command line, or the Task Scheduler can be opened through the GUI within the Administrator Tools section of the Control Panel.(Citation: Stack Overflow) In some cases, adversaries have used a .NET wrapper for the W...

Windows
82
Detections
4
Sources
54
Threat Actors

BY SOURCE

31sigma23splunk_escu18elastic10crowdstrike_cql

PROCEDURES (39)

General Monitoring8 detections

Auto-extracted: 8 detections for general monitoring

Suspicious7 detections

Auto-extracted: 7 detections for suspicious

Privilege4 detections

Auto-extracted: 4 detections for privilege

Process Creation Monitoring4 detections

Auto-extracted: 4 detections for process creation monitoring

Scheduled Task4 detections

Auto-extracted: 4 detections for scheduled task

Powershell4 detections

Auto-extracted: 4 detections for powershell

Remote4 detections

Auto-extracted: 4 detections for remote

Scheduled Task3 detections

Auto-extracted: 3 detections for scheduled task

Registry3 detections

Auto-extracted: 3 detections for registry

Persist3 detections

Auto-extracted: 3 detections for persist

Event Log2 detections

Auto-extracted: 2 detections for event log

Authentication Monitoring2 detections

Auto-extracted: 2 detections for authentication monitoring

Lateral2 detections

Auto-extracted: 2 detections for lateral

Remote2 detections

Auto-extracted: 2 detections for remote

Registry2 detections

Auto-extracted: 2 detections for registry

Unusual2 detections

Auto-extracted: 2 detections for unusual

Suspicious2 detections

Auto-extracted: 2 detections for suspicious

Service2 detections

Auto-extracted: 2 detections for service

Ransomware2 detections

Auto-extracted: 2 detections for ransomware

Ransomware1 detections

Auto-extracted: 1 detections for ransomware

Parent Process1 detections

Auto-extracted: 1 detections for parent process

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Wmi1 detections

Auto-extracted: 1 detections for wmi

Service1 detections

Auto-extracted: 1 detections for service

Parent Process1 detections

Auto-extracted: 1 detections for parent process

Service1 detections

Auto-extracted: 1 detections for service

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Evasion1 detections

Auto-extracted: 1 detections for evasion

Evasion1 detections

Auto-extracted: 1 detections for evasion

Lateral1 detections

Auto-extracted: 1 detections for lateral

Parent Process1 detections

Auto-extracted: 1 detections for parent process

Powershell1 detections

Auto-extracted: 1 detections for powershell

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

Parent Process1 detections

Auto-extracted: 1 detections for parent process

Wmi1 detections

Auto-extracted: 1 detections for wmi

Script Execution Monitoring1 detections

Auto-extracted: 1 detections for script execution monitoring

Persist1 detections

Auto-extracted: 1 detections for persist

DETECTIONS (82)

A scheduled task was created
elasticlow
Creation or Modification of a new GPO Scheduled Task or Service
elasticlow
Find events that are scheduled
crowdstrike_cql
Find events triggered at a specific time
crowdstrike_cql
Find events triggered at logon
crowdstrike_cql
Find events triggered at startup
crowdstrike_cql
Find events triggered on an event
crowdstrike_cql
Find hidden scheduled tasks
crowdstrike_cql
Find tasks scheduled by logon type
crowdstrike_cql
Find tasks scheduled by run level
crowdstrike_cql
Find tasks scheduled by user ID
crowdstrike_cql
Find tasks scheduled with ComHandler
crowdstrike_cql
HackTool - Default PowerSploit/Empire Scheduled Task Creation
sigmahigh
Important Scheduled Task Deleted/Disabled
sigmahigh
Local Scheduled Task Creation
elasticlow
Outbound Scheduled Task Activity via PowerShell
elasticmedium
Persistence and Execution at Scale via GPO Scheduled Task
sigmahigh
Persistence via a Windows Installer
elasticmedium
Persistence via Scheduled Job Creation
elasticmedium
Persistence via TelemetryController Scheduled Task Hijack
elastichigh
Possible Lateral Movement PowerShell Spawn
splunk_escu
Potential Persistence Via Microsoft Compatibility Appraiser
sigmamedium
Potential Persistence Via Powershell Search Order Hijacking - Task
sigmahigh
Potential PowerShell HackTool Script by Function Names
elasticmedium
Potential Registry Persistence Attempt Via Windows Telemetry
sigmahigh
Potential SSH Tunnel Persistence Install Using A Scheduled Task
sigmahigh
Powershell Create Scheduled Task
sigmamedium
Randomly Generated Scheduled Task Name
splunk_escu
Remote Scheduled Task Creation
elasticmedium
Remote Scheduled Task Creation via RPC
elasticmedium
Renamed Schtasks Execution
sigmahigh
Schedule Task Creation From Env Variable Or Potentially Suspicious Path Via Schtasks.EXE
sigmamedium
Scheduled Task Created by a Windows Script
elasticmedium
Scheduled Task Creation Masquerading as System Processes
sigmahigh
Scheduled Task Creation Via Schtasks.EXE
sigmalow
Scheduled Task Creation with Curl and PowerShell Execution Combo
sigmamedium
Scheduled Task Deleted Or Created via CMD
splunk_escu
Scheduled Task Executed From A Suspicious Location
sigmamedium
Scheduled Task Executed Uncommon LOLBIN
sigmamedium
Scheduled Task Executing Encoded Payload from Registry
sigmahigh
Scheduled Task Executing Payload from Registry
sigmamedium
Scheduled Task Execution at Scale via GPO
elasticmedium
Scheduled Task Initiation on Remote Endpoint
splunk_escu
Scheduled TaskCache Change by Uncommon Program
sigmahigh
Schtasks Creation Or Modification With SYSTEM Privileges
sigmahigh
Schtasks From Suspicious Folders
sigmahigh
Schtasks scheduling job on remote system
splunk_escu
Schtasks used for forcing a reboot
splunk_escu
Short Lived Scheduled Task
splunk_escu
Suspicious Command Patterns In Scheduled Task Creation
sigmahigh
Suspicious Execution via Scheduled Task
elasticmedium
Suspicious Image Load (taskschd.dll) from MS Office
elasticlow
Suspicious Modification Of Scheduled Tasks
sigmahigh
Suspicious Scheduled Task Creation
sigmahigh
Suspicious Scheduled Task Creation Involving Temp Folder
sigmahigh
Suspicious Scheduled Task Creation via Masqueraded XML File
sigmamedium
Suspicious Scheduled Task from Public Directory
splunk_escu
Suspicious Scheduled Task Name As GUID
sigmamedium
Suspicious Scheduled Task Update
sigmahigh
Suspicious Schtasks Execution AppData Folder
sigmahigh
Suspicious Schtasks Schedule Type With High Privileges
sigmamedium
Suspicious Schtasks Schedule Types
sigmahigh
Suspicious ScreenConnect Client Child Process
elasticmedium
Svchost LOLBAS Execution Process Spawn
splunk_escu
Temporarily Scheduled Task Creation
elasticmedium
UAC Bypass via DiskCleanup Scheduled Task Hijack
elasticmedium
Uncommon One Time Only Scheduled Task At 00:00
sigmahigh
Unusual Scheduled Task Update
elasticlow
Windows Compatibility Telemetry Suspicious Child Process
splunk_escu
Windows Compatibility Telemetry Tampering Through Registry
splunk_escu
Windows Enable Win32 ScheduledJob via Registry
splunk_escu
Windows PowerShell ScheduleTask
splunk_escu
Windows Registry Delete Task SD
splunk_escu
Windows Scheduled Task Created Via XML
splunk_escu
Windows Scheduled Task Service Spawned Shell
splunk_escu
Windows Scheduled Task with Highest Privileges
splunk_escu
Windows Scheduled Task with Suspicious Command
splunk_escu
Windows Scheduled Task with Suspicious Name
splunk_escu
Windows Schtasks Create Run As System
splunk_escu
WinEvent Scheduled Task Created to Spawn Shell
splunk_escu
WinEvent Scheduled Task Created Within Public Path
splunk_escu
WinEvent Windows Task Scheduler Event Action Started
splunk_escu