cscli scenarios install sigmahq/proc_creation_win_schtasks_appdata_local_system
1type: trigger2name: sigmahq/proc_creation_win_schtasks_appdata_local_system3description: |4 Detects the creation of a schtask that executes a file from C:\Users\<USER>\AppData\Local5filter: |6 (evt.Meta.service == 'sysmon' && evt.Parsed.EventID == '1') && (evt.Parsed.Image endsWith '\\schtasks.exe' && evt.Parsed.CommandLine contains '/Create' && evt.Parsed.CommandLine contains '/RU' && evt.Parsed.CommandLine contains '/TR' && evt.Parsed.CommandLine contains 'C:\\Users\\' && evt.Parsed.CommandLine contains '\\AppData\\Local\\' && (evt.Parsed.CommandLine contains 'NT AUT' || evt.Parsed.CommandLine contains ' SYSTEM ') && not (evt.Parsed.ParentImage contains '\\AppData\\Local\\Temp\\' && evt.Parsed.ParentImage contains 'TeamViewer_.exe' && evt.Parsed.Image endsWith '\\schtasks.exe' && evt.Parsed.CommandLine contains '/TN TVInstallRestore'))7blackhole: 2m8#status: test9labels:10 service: windows11 confidence: 112 spoofable: 013 classification:14 - attack.t1053.00515 - attack.t1059.0011617 label: "Suspicious Schtasks Execution AppData Folder"18 behavior : "windows:audit"19 remediation: false2021scope:22 type: ParentProcessId23 expression: evt.Parsed.ParentProcessId2425