Common Information
Type Value
Value
Scheduled Task - T1053
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Utilities such as at and schtasks, along with the Windows Task Scheduler, can be used to schedule programs or scripts to be executed at a date and time. A task can also be scheduled on a remote system, provided the proper authentication is met to use RPC and file and printer sharing is turned on. Scheduling a task on a remote system typically required being a member of the Administrators group on the the remote system. (Citation: TechNet Task Scheduler Security) An adversary may use task scheduling to execute programs at system startup or on a scheduled basis for persistence, to conduct remote Execution as part of Lateral Movement, to gain SYSTEM privileges, or to run a process under the context of a specified account. Detection: Monitor scheduled task creation from common utilities using command-line invocation. Legitimate scheduled tasks may be created during installation of new software or through system administration functions. Monitor process execution from the <code>svchost.exe</code> in Windows 10 and the Windows Task Scheduler <code>taskeng.exe</code> for older versions of Windows. (Citation: Twitter Leoloobeek Scheduled Task) If scheduled tasks are not used for persistence, then the adversary is likely to remove the task when the action is complete. Monitor Windows Task Scheduler stores in <code>%systemroot%\System32\Tasks</code> for change entries related to scheduled tasks that do not correlate with known software, patch cycles, etc. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as network connections made for Command and Control, learning details about the environment through Discovery, and Lateral Movement. Configure event logging for scheduled task creation and changes by enabling the "Microsoft-Windows-TaskScheduler/Operational" setting within the event logging service. (Citation: TechNet Forum Scheduled Task Operational Setting) Several events will then be logged on scheduled task activity, including: (Citation: TechNet Scheduled Task Events) *Event ID 106 - Scheduled task registered *Event ID 140 - Scheduled task updated *Event ID 141 - Scheduled task removed Tools such as Sysinternals Autoruns may also be used to detect system changes that could be attempts at persistence, including listing current scheduled tasks. (Citation: TechNet Autoruns) Look for changes to tasks that do not correlate with known software, patch cycles, etc. Suspicious program execution through scheduled tasks may show up as outlier processes that have not been seen before when compared against historical data. Monitor processes and command-line arguments for actions that could be taken to create tasks. Remote access tools with built-in features may interact directly with the Windows API to perform these functions outside of typical system utilities. Tasks may also be created through Windows system management tools such as Windows Management Instrumentation and PowerShell, so additional logging may need to be configured to gather the appropriate data. Platforms: Windows Data Sources: File monitoring, Process command-line parameters, Process monitoring, Windows event logs Effective Permissions: Administrator, SYSTEM, User Permissions Required: Administrator, SYSTEM, User Remote Support: Yes Contributors: Travis Smith, Tripwire, Leo Loobeek, @leoloobeek, Alain Homewood, Insomnia Security
Details Published Attributes CTI Title
Details Website 2024-10-07 23 Analyzing the Awaken Likho APT group implant: new tools and techniques
Details Website 2024-10-07 141 Mind the (air) gap: GoldenJackal gooses government guardrails
Details Website 2024-10-06 7 Hunting for malicious scheduled tasks - Threat hunting with hints of incident response
Details Website 2024-10-06 18 YUNIT STEALER - CYFIRMA
Details Website 2024-10-04 32 LemonDuck Unleashes Cryptomining Attacks Through SMB Service Exploits
Details Website 2024-10-04 11 Hackers Turned Visual Studio Code As A Remote Access Tool | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-10-04 100 Агент SIEM используется в атаках SilentCryptoMiner
Details Website 2024-10-04 100 SIEM agent being used in SilentCryptoMiner attacks
Details Website 2024-10-03 4 North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks
Details Website 2024-10-03 4 North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-10-03 2 Release Notes: Safebrowsing, Private AI Assistant, Splunk Integration, and more
Details Website 2024-10-03 2 Release Notes: Safebrowsing, Splunk Integration, YARA, and more
Details Website 2024-10-03 21 Latrodectus Malware Masquerades as AhnLab Security Software to Infect Victims
Details Website 2024-10-03 38 Decoy Manuals and Malicious Browser Extensions: A Closer Look at a Multi-Layered Threat
Details Website 2024-10-02 25 Security Brief: Royal Mail Lures Deliver Open Source Prince Ransomware | Proofpoint US
Details Website 2024-10-02 0 How to Use Wazuh SIEM to Investigate Cyber Attacks | TryHackMe Monday Monitor
Details Website 2024-10-01 11 Cyble Researchers Uncover Sophisticated Attack Using VSCode for Remote Access
Details Website 2024-10-01 27 Silent Intrusion: Unraveling The Sophisticated Attack Leveraging VS Code For Unauthorized Access - Cyble
Details Website 2024-10-01 0 Threat Actors Seen Deploying AI-Written Malware
Details Website 2024-09-30 6 Additional things identifying Indicators of Compromise (IOCs) for malware.
Details Website 2024-09-30 12 Netskope Threat Labs Uncovers New XWorm’s Stealthy Techniques
Details Website 2024-09-30 5 HackTheBox Sherlock Writeup: OpTinselTrace-5
Details Website 2024-09-30 11 AhnLab EDR을 활용한 리눅스 지속성 유지 기법 탐지 (1) - ASEC
Details Website 2024-09-30 174 Nitrogen Campaign Drops Sliver and Ends With BlackCat Ransomware
Details Website 2024-09-30 27 Threat Intelligence Report 24th September – 30th September 2024