Files
hayabusa/rules/Sigma/win_rare_schtask_creation.yml
2021-11-14 11:00:56 +09:00

27 lines
755 B
YAML

title: Rare Scheduled Task Creations
author: Florian Roth
date: 2017/03/17
description: This rule detects rare scheduled task creations. Typically software gets
installed on multiple systems and not only on a few. The aggregation and count
function selects tasks with rare names.
detection:
SELECTION_1:
EventID: 106
condition: SELECTION_1| count() by TaskName < 5
falsepositives:
- Software installation
id: b20f6158-9438-41be-83da-a5a16ac90c2b
level: low
logsource:
product: windows
service: taskscheduler
status: experimental
tags:
- attack.persistence
- attack.t1053
- attack.s0111
- attack.t1053.005
yml_filename: win_rare_schtask_creation.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/other