Detectionhightest

Uncommon One Time Only Scheduled Task At 00:00

Detects scheduled task creation events that include suspicious actions, and is run once at 00:00

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Martin MuellerCreated Fri Jul 15Updated Fri Feb 03970823b7-273b-460a-8afc-3a6811998529windows
Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation

Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.

Detection Logic
Detection Logic3 selectors
detection:
    selection_img:
        - Image|contains: '\schtasks.exe'
        - OriginalFileName: 'schtasks.exe'
    selection_cli:
        CommandLine|contains:
            - 'wscript'
            - 'vbscript'
            - 'cscript'
            - 'wmic '
            - 'wmic.exe'
            - 'regsvr32.exe'
            - 'powershell'
            - '\AppData\'
    selection_time:
        CommandLine|contains|all:
            - 'once'
            - '00:00'
    condition: all of selection_*
False Positives

Software installation

Rule Metadata
Rule ID
970823b7-273b-460a-8afc-3a6811998529
Status
test
Level
high
Type
Detection
Created
Fri Jul 15
Modified
Fri Feb 03
Path
rules/windows/process_creation/proc_creation_win_schtasks_one_time_only_midnight_task.yml
Raw Tags
attack.executionattack.persistenceattack.privilege-escalationattack.t1053.005
View on GitHub