Detects creation of a scheduled task with a GUID like name
title: Suspicious Scheduled Task Name As GUID
id: ff2fff64-4cd6-4a2b-ba7d-e28a30bbe66b
status: test
description: Detects creation of a scheduled task with a GUID like name
references:
- https://thedfirreport.com/2022/10/31/follina-exploit-leads-to-domain-compromise/
- https://thedfirreport.com/2022/02/21/qbot-and-zerologon-lead-to-full-domain-compromise/
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-10-31
tags:
- attack.privilege-escalation
- attack.persistence
- attack.execution
- attack.t1053.005
logsource:
product: windows
category: process_creation
detection:
selection_img:
Image|endswith: '\schtasks.exe'
CommandLine|contains: '/Create '
selection_tn:
CommandLine|contains:
# Can start with single or double quote
- '/TN "{'
- "/TN '{"
- "/TN {"
selection_end:
CommandLine|contains:
# Ending of the name to avoid possible FP in the rest of the commandline
- '}"'
- "}'"
- '} '
condition: all of selection_*
falsepositives:
- Legitimate software naming their tasks as GUIDs
level: medium
imProcessCreate
| where (TargetProcessName endswith "\\schtasks.exe" and TargetProcessCommandLine contains "/Create ") and (TargetProcessCommandLine contains "/TN \"{" or TargetProcessCommandLine contains "/TN '{" or TargetProcessCommandLine contains "/TN {") and (TargetProcessCommandLine contains "}\"" or TargetProcessCommandLine contains "}'" or TargetProcessCommandLine contains "} ")
| Sentinel Table | Notes |
|---|---|
imProcessCreate | Ensure this data connector is enabled |