cscli scenarios install sigmahq/proc_creation_win_schtasks_system
1type: trigger2name: sigmahq/proc_creation_win_schtasks_system3description: |4 Detects the creation or update of a scheduled task to run with "NT AUTHORITY\SYSTEM" privileges5filter: |6 (evt.Meta.service == 'sysmon' && evt.Parsed.EventID == '1') && (evt.Parsed.Image endsWith '\\schtasks.exe' && (evt.Parsed.CommandLine contains ' /change ' || evt.Parsed.CommandLine contains ' /create ') && evt.Parsed.CommandLine contains '/ru ' && (evt.Parsed.CommandLine contains 'NT AUT' || evt.Parsed.CommandLine contains ' SYSTEM ') && not (evt.Parsed.Image endsWith '\\schtasks.exe' && evt.Parsed.CommandLine contains '/TN TVInstallRestore' && evt.Parsed.CommandLine contains '\\TeamViewer_.exe' || evt.Parsed.CommandLine contains '/Create /F /RU System /SC WEEKLY /TN AviraSystemSpeedupVerify /TR ' || evt.Parsed.CommandLine contains ':\\Program Files (x86)\\Avira\\System Speedup\\setup\\avira_speedup_setup.exe' || evt.Parsed.CommandLine contains '/VERIFY /VERYSILENT /NOSTART /NODOTNET /NORESTART" /RL HIGHEST'))7blackhole: 2m8#status: test9labels:10 service: windows11 confidence: 112 spoofable: 013 classification:14 - attack.t1053.0051516 label: "Schtasks Creation Or Modification With SYSTEM Privileges"17 behavior : "windows:audit"18 remediation: false1920scope:21 type: ParentProcessId22 expression: evt.Parsed.ParentProcessId2324