本地计划任务创建
编辑本地计划任务创建
编辑指示创建计划任务。攻击者可以使用这些任务来建立持久性、横向移动和/或提升权限。
规则类型: eql
规则索引:
- winlogbeat-*
- logs-endpoint.events.process-*
- logs-windows.sysmon_operational-*
严重性: 低
风险评分: 21
运行频率: 5 分钟
搜索索引起始时间: now-9m (日期数学格式,另请参阅 额外的回溯时间
)
每次执行的最大警报数: 100
参考:
- https://elastic.ac.cn/security-labs/hunting-for-persistence-using-elastic-security-part-1
- https://elastic.ac.cn/security-labs/hunting-for-persistence-using-elastic-security-part-2
- https://elastic.ac.cn/security-labs/invisible-miners-unveiling-ghostengine
- https://elastic.ac.cn/security-labs/elastic-protects-against-data-wiper-malware-targeting-ukraine-hermeticwiper
标签:
- 域:端点
- 操作系统:Windows
- 用例:威胁检测
- 策略:持久性
- 数据源:Elastic Defend
- 数据源:Sysmon
版本: 208
规则作者:
- Elastic
规则许可证: Elastic License v2
规则查询
编辑sequence with maxspan=1m [process where host.os.type == "windows" and event.type != "end" and ((process.name : ("cmd.exe", "wscript.exe", "rundll32.exe", "regsvr32.exe", "wmic.exe", "mshta.exe", "powershell.exe", "pwsh.exe", "powershell_ise.exe", "WmiPrvSe.exe", "wsmprovhost.exe", "winrshost.exe") or process.pe.original_file_name : ("cmd.exe", "wscript.exe", "rundll32.exe", "regsvr32.exe", "wmic.exe", "mshta.exe", "powershell.exe", "pwsh.dll", "powershell_ise.exe", "WmiPrvSe.exe", "wsmprovhost.exe", "winrshost.exe")) or ?process.code_signature.trusted == false)] by process.entity_id [process where host.os.type == "windows" and event.type == "start" and (process.name : "schtasks.exe" or process.pe.original_file_name == "schtasks.exe") and process.args : ("/create", "-create") and process.args : ("/RU", "/SC", "/TN", "/TR", "/F", "/XML") and /* exclude SYSTEM Integrity Level - look for task creations by non-SYSTEM user */ not (?process.Ext.token.integrity_level_name : "System" or ?winlog.event_data.IntegrityLevel : "System") ] by process.parent.entity_id
框架: MITRE ATT&CKTM
-
策略
- 名称:持久性
- ID: TA0003
- 参考 URL: https://attack.mitre.org/tactics/TA0003/
-
技术
- 名称:计划任务/作业
- ID: T1053
- 参考 URL: https://attack.mitre.org/techniques/T1053/
-
子技术
- 名称:计划任务
- ID: T1053.005
- 参考 URL: https://attack.mitre.org/techniques/T1053/005/