title: Rare Scheduled Task Creations author: Florian Roth date: 2017/03/17 description: This rule detects rare scheduled task creations. Typically software gets installed on multiple systems and not only on a few. The aggregation and count function selects tasks with rare names. detection: SELECTION_1: EventID: 106 condition: SELECTION_1| count() by TaskName < 5 falsepositives: - Software installation id: b20f6158-9438-41be-83da-a5a16ac90c2b level: low logsource: product: windows service: taskscheduler status: experimental tags: - attack.persistence - attack.t1053 - attack.s0111 - attack.t1053.005 yml_filename: win_rare_schtask_creation.yml yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/other