2020-12-15 19:10:52 +01:00
[ metadata ]
creation_date = "2020/12/15"
2023-01-04 09:30:07 -05:00
integration = [ "endpoint" , "windows" ]
2020-12-15 19:10:52 +01:00
maturity = "production"
2022-08-24 10:38:49 -06:00
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
min_stack_version = "8.3.0"
2024-04-16 13:26:42 -03:00
updated_date = "2024/04/08"
2020-12-15 19:10:52 +01:00
[ rule ]
author = [ "Elastic" ]
description = "" "
Identifies the PowerShell process loading the Task Scheduler COM DLL followed by an outbound RPC network connection
within a short time period. This may indicate lateral movement or remote discovery via scheduled tasks.
" ""
false_positives = [ "Legitimate scheduled tasks may be created during installation of new software." ]
from = "now-9m"
2024-04-16 13:26:42 -03:00
index = [ "winlogbeat-*" , "logs-endpoint.events.library-*" , "logs-endpoint.events.network-*" , "logs-windows.sysmon_operational-*" ]
2020-12-15 19:10:52 +01:00
language = "eql"
2021-03-03 22:12:11 -09:00
license = "Elastic License v2"
2020-12-15 19:10:52 +01:00
name = "Outbound Scheduled Task Activity via PowerShell"
references = [
"https://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/" ,
]
risk_score = 47
rule_id = "5cd55388-a19c-47c7-8ec4-f41656c2fded"
severity = "medium"
2024-03-26 14:45:04 +01:00
tags = [
"Domain: Endpoint" ,
"OS: Windows" ,
"Use Case: Threat Detection" ,
"Tactic: Execution" ,
"Data Source: Elastic Defend" ,
"Data Source: Sysmon"
]
2020-12-15 19:10:52 +01:00
type = "eql"
query = '' '
sequence by host.id, process.entity_id with maxspan = 5s
2023-03-05 09:41:19 -09:00
[any where host.os.type == "windows" and (event.category == "library" or (event.category == "process" and event.action : "Image loaded*")) and
2024-03-13 10:27:44 -03:00
(?dll.name : "taskschd.dll" or file.name : "taskschd.dll") and process.name : ("powershell.exe", "pwsh.exe", "powershell_ise.exe")]
2024-03-26 14:45:04 +01:00
[network where host.os.type == "windows" and process.name : ("powershell.exe", "pwsh.exe", "powershell_ise.exe") and destination.port == 135 and not destination.address in ("127.0.0.1", "::1")]
2020-12-15 19:10:52 +01:00
' ''
[ [ rule . threat ] ]
framework = "MITRE ATT&CK"
2024-03-26 14:45:04 +01:00
2020-12-15 19:10:52 +01:00
[ [ rule . threat . technique ] ]
id = "T1053"
name = "Scheduled Task/Job"
reference = "https://attack.mitre.org/techniques/T1053/"
2024-03-26 14:45:04 +01:00
2023-01-04 09:30:07 -05:00
[ [ rule . threat . technique . subtechnique ] ]
id = "T1053.005"
name = "Scheduled Task"
reference = "https://attack.mitre.org/techniques/T1053/005/"
2024-03-26 14:45:04 +01:00
2023-10-15 18:12:20 -03:00
[ [ rule . threat . technique ] ]
id = "T1059"
name = "Command and Scripting Interpreter"
reference = "https://attack.mitre.org/techniques/T1059/"
2024-03-26 14:45:04 +01:00
2023-10-15 18:12:20 -03:00
[ [ rule . threat . technique . subtechnique ] ]
id = "T1059.001"
name = "PowerShell"
reference = "https://attack.mitre.org/techniques/T1059/001/"
2020-12-15 19:10:52 +01:00
[ rule . threat . tactic ]
2020-12-18 12:46:16 -09:00
id = "TA0002"
name = "Execution"
reference = "https://attack.mitre.org/tactics/TA0002/"