Detectionhightest
Uncommon One Time Only Scheduled Task At 00:00
Detects scheduled task creation events that include suspicious actions, and is run once at 00:00
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation
Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.
Detection Logic
Detection Logic3 selectors
detection:
selection_img:
- Image|contains: '\schtasks.exe'
- OriginalFileName: 'schtasks.exe'
selection_cli:
CommandLine|contains:
- 'wscript'
- 'vbscript'
- 'cscript'
- 'wmic '
- 'wmic.exe'
- 'regsvr32.exe'
- 'powershell'
- '\AppData\'
selection_time:
CommandLine|contains|all:
- 'once'
- '00:00'
condition: all of selection_*False Positives
Software installation
References
MITRE ATT&CK
Rule Metadata
Rule ID
970823b7-273b-460a-8afc-3a6811998529
Status
test
Level
high
Type
Detection
Created
Fri Jul 15
Modified
Fri Feb 03
Author
Path
rules/windows/process_creation/proc_creation_win_schtasks_one_time_only_midnight_task.yml
Raw Tags
attack.executionattack.persistenceattack.privilege-escalationattack.t1053.005