Files
hayabusa/rules/Sigma/win_susp_schtask_creation_temp_folder.yml
2021-11-14 11:00:56 +09:00

39 lines
1.1 KiB
YAML

title: Suspicious Scheduled Task Creation Involving Temp Folder
author: Florian Roth
date: 2021/03/11
description: Detects the creation of scheduled tasks that involves a temporary folder
and runs only once
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
Image: '*\schtasks.exe'
SELECTION_3:
CommandLine: '* /create *'
SELECTION_4:
CommandLine: '* /sc once *'
SELECTION_5:
CommandLine: '*\Temp\\*'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4 and SELECTION_5)
falsepositives:
- Administrative activity
- Software installation
fields:
- CommandLine
- ParentCommandLine
id: 39019a4e-317f-4ce3-ae63-309a8c6b53c5
level: high
logsource:
category: process_creation
product: windows
references:
- https://discuss.elastic.co/t/detection-and-response-for-hafnium-activity/266289/3
status: experimental
tags:
- attack.execution
- attack.persistence
- attack.t1053.005
yml_filename: win_susp_schtask_creation_temp_folder.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation