File tree Expand file tree Collapse file tree 1 file changed +35
-0
lines changed
rules-threat-hunting/windows/image_load Expand file tree Collapse file tree 1 file changed +35
-0
lines changed Original file line number Diff line number Diff line change 1+ title : Task Scheduler DLL Loaded By Application Located In Potentially Suspicious Location
2+ id : 3b92a1d0-8d4b-4d28-a1b4-1e29d49a6a3e
3+ status : experimental
4+ description : |
5+ Detects the loading of the "taskschd.dll" module from a process that located in a potentially suspicious or uncommon directory.
6+ The loading of this DLL might indicate that the application have the capability to create a scheduled task via the "Schedule.Service" COM object.
7+ Investigation of the loading application and its behavior is required to determining if its malicious.
8+ references :
9+ - https://www.logpoint.com/en/blog/shenanigans-of-scheduled-tasks/
10+ - https://x.com/Max_Mal_/status/1826179497084739829
11+ author : Swachchhanda Shrawan Poudel
12+ date : 2024-09-02
13+ tags :
14+ - attack.persistence
15+ - attack.execution
16+ - attack.t1053.005
17+ logsource :
18+ category : image_load
19+ product : windows
20+ detection :
21+ selection_dll :
22+ - ImageLoaded|endswith : ' \taskschd.dll'
23+ - OriginalFileName : ' taskschd.dll'
24+ selection_paths :
25+ Image|contains :
26+ - ' :\Temp\'
27+ - ' :\Users\Public\'
28+ - ' :\Windows\Temp\'
29+ - ' \AppData\Local\Temp\'
30+ - ' \Desktop\'
31+ - ' \Downloads\'
32+ condition : all of selection_*
33+ falsepositives :
34+ - Some installers might generate false positives, apply additional filters accordingly.
35+ level : low
You can’t perform that action at this time.
0 commit comments