title: Schtasks Creation Or Modification With SYSTEM Privileges id: 89ca78fd-b37c-4310-b3d3-81a023f83936 status: experimental description: Detects the creation or update of a scheduled task to run with "NT AUTHORITY\SYSTEM" privileges references: - https://www.elastic.co/security-labs/exploring-the-qbot-attack-pattern - https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/schtasks author: Nasreddine Bencherchali (Nextron Systems) date: 2022/07/28 modified: 2023/03/14 tags: - attack.execution - attack.persistence - attack.t1053.005 logsource: product: windows category: process_creation detection: selection_root: Image|endswith: '\schtasks.exe' CommandLine|contains: - ' /change ' - ' /create ' selection_run: CommandLine|contains: '/ru ' selection_user: CommandLine|contains: - 'NT AUT' # This covers the usual NT AUTHORITY\SYSTEM - ' SYSTEM ' # SYSTEM is a valid value for schtasks hence it gets it's own value with space filter_teamviewer: # FP from test set in SIGMA ParentImage|contains|all: - '\AppData\Local\Temp\' - 'TeamViewer_.exe' Image|endswith: '\schtasks.exe' CommandLine|contains: '/TN TVInstallRestore' filter_avira: CommandLine|contains: - '/Create /F /RU System /SC WEEKLY /TN AviraSystemSpeedupVerify /TR ' - 'C:\Program Files (x86)\Avira\System Speedup\setup\avira_speedup_setup.exe' - '/VERIFY /VERYSILENT /NOSTART /NODOTNET /NORESTART" /RL HIGHEST' condition: all of selection_* and not 1 of filter_* falsepositives: - Unknown level: high