Detection rules › Sigma

HackTool - Default PowerSploit/Empire Scheduled Task Creation

Severity
high
Author
Markus Neis, @Karneades
Source
upstream

Detects the creation of a schtask via PowerSploit or Empire Default Configuration.

MITRE ATT&CK coverage

TacticTechniques
ExecutionT1053.005 Scheduled Task/Job: Scheduled Task, T1059.001 Command and Scripting Interpreter: PowerShell
PersistenceT1053.005 Scheduled Task/Job: Scheduled Task
Privilege EscalationT1053.005 Scheduled Task/Job: Scheduled Task

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation
Security-Auditing4688A new process has been created.

Stages and Predicates

Stage 1: selection

or:
CommandLine|contains: '/SC DAILY /ST'
CommandLine|contains: '/SC HOURLY'
CommandLine|contains: '/SC ONIDLE'
CommandLine|contains: '/SC ONLOGON'
or:
ParentImage|endswith: '\powershell.exe'
ParentImage|endswith: '\pwsh.exe'
CommandLine|contains: '/Create'
CommandLine|contains: '/TN Updater /TR'
CommandLine|contains: 'powershell.exe -NonI'
Image|endswith: '\schtasks.exe'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • /Create corpus 4 (sigma 4)
  • /SC DAILY /ST
  • /SC HOURLY
  • /SC ONIDLE
  • /SC ONLOGON
  • /TN Updater /TR
  • powershell.exe -NonI
Imageends_with
  • \schtasks.exe corpus 45 (sigma 45)
ParentImageends_with
  • \powershell.exe corpus 16 (sigma 16)
  • \pwsh.exe corpus 16 (sigma 16)