2020-12-15 19:10:52 +01:00
[ metadata ]
creation_date = "2020/12/15"
2023-01-04 09:30:07 -05:00
integration = [ "endpoint" , "windows" ]
2020-12-15 19:10:52 +01:00
maturity = "production"
2022-08-24 10:38:49 -06:00
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
min_stack_version = "8.3.0"
2023-10-15 18:12:20 -03:00
updated_date = "2023/10/09"
2020-12-15 19:10:52 +01:00
[ rule ]
author = [ "Elastic" ]
description = "" "
Identifies the PowerShell process loading the Task Scheduler COM DLL followed by an outbound RPC network connection
within a short time period. This may indicate lateral movement or remote discovery via scheduled tasks.
" ""
false_positives = [ "Legitimate scheduled tasks may be created during installation of new software." ]
from = "now-9m"
2021-01-28 20:53:57 -09:00
index = [ "winlogbeat-*" , "logs-endpoint.events.*" , "logs-windows.*" ]
2020-12-15 19:10:52 +01:00
language = "eql"
2021-03-03 22:12:11 -09:00
license = "Elastic License v2"
2020-12-15 19:10:52 +01:00
name = "Outbound Scheduled Task Activity via PowerShell"
references = [
"https://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/" ,
]
risk_score = 47
rule_id = "5cd55388-a19c-47c7-8ec4-f41656c2fded"
severity = "medium"
2023-09-05 15:22:01 -03:00
tags = [ "Domain: Endpoint" , "OS: Windows" , "Use Case: Threat Detection" , "Tactic: Execution" , "Data Source: Elastic Defend" ]
2020-12-15 19:10:52 +01:00
type = "eql"
query = '' '
sequence by host.id, process.entity_id with maxspan = 5s
2023-03-05 09:41:19 -09:00
[any where host.os.type == "windows" and (event.category == "library" or (event.category == "process" and event.action : "Image loaded*")) and
2022-08-02 18:40:26 +02:00
(dll.name : "taskschd.dll" or file.name : "taskschd.dll") and process.name : ("powershell.exe", "pwsh.exe", "powershell_ise.exe")]
2023-03-05 09:41:19 -09:00
[network where host.os.type == "windows" and process.name : ("powershell.exe", "pwsh.exe", "powershell_ise.exe") and destination.port == 135 and not destination.address in ("127.0.0.1", "::1")]
2020-12-15 19:10:52 +01:00
' ''
[ [ rule . threat ] ]
framework = "MITRE ATT&CK"
[ [ rule . threat . technique ] ]
id = "T1053"
name = "Scheduled Task/Job"
reference = "https://attack.mitre.org/techniques/T1053/"
2023-01-04 09:30:07 -05:00
[ [ rule . threat . technique . subtechnique ] ]
id = "T1053.005"
name = "Scheduled Task"
reference = "https://attack.mitre.org/techniques/T1053/005/"
2023-10-15 18:12:20 -03:00
[ [ rule . threat . technique ] ]
id = "T1059"
name = "Command and Scripting Interpreter"
reference = "https://attack.mitre.org/techniques/T1059/"
[ [ rule . threat . technique . subtechnique ] ]
id = "T1059.001"
name = "PowerShell"
reference = "https://attack.mitre.org/techniques/T1059/001/"
2020-12-15 19:10:52 +01:00
2021-09-23 14:08:38 -03:00
2020-12-15 19:10:52 +01:00
[ rule . threat . tactic ]
2020-12-18 12:46:16 -09:00
id = "TA0002"
name = "Execution"
reference = "https://attack.mitre.org/tactics/TA0002/"
2021-02-17 19:49:58 -09:00