Windows Scheduled Tasks AT Command Enabled via Registry Modification
Attackers may enable the deprecated Windows AT command via registry modification to achieve local persistence or lateral movement.
The legacy Windows AT command allows scheduling tasks for execution. While deprecated since Windows 8 and Windows Server 2012, it remains present for backwards compatibility. Attackers may enable the AT command through registry modifications to achieve persistence or lateral movement within a network. This technique bypasses modern security controls and can be difficult to detect without specific monitoring. The detection rule monitors registry changes enabling this command, flagging potential misuse by checking specific registry paths and values indicative of enabling the AT command. The use of this command allows an attacker to execute commands with elevated privileges, potentially compromising the entire system.
Attack Chain
- An attacker gains initial access to a system, possibly through phishing or exploiting a vulnerability.
- The attacker attempts to enable the AT command by modifying the registry.
- The registry key
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Configuration\EnableAtis modified to a value of “1” or “0x00000001”. - The attacker uses the AT command to schedule a malicious task.
- The scheduled task executes a command or script, such as downloading and executing malware.
- The malware establishes persistence on the system.
- The attacker uses the compromised system as a pivot point for lateral movement.
Impact
Enabling the AT command can lead to unauthorized task scheduling, malware execution, persistence, and lateral movement within a network. Successful exploitation can compromise sensitive data, disrupt operations, and grant attackers persistent access to critical systems. The use of a deprecated command makes it harder to detect, increasing the impact.
Recommendation
- Monitor registry events for modifications to
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Configuration\EnableAtas described in the rule overview. - Deploy the Sigma rule “Scheduled Tasks AT Command Enabled” to your SIEM and tune for your environment.
- Enable Sysmon process creation and registry event logging to activate the rule.
- Investigate any alerts triggered by the Sigma rule “Scheduled Tasks AT Command Enabled” for suspicious activity.
Detection coverage 2
Scheduled Tasks AT Command Enabled
mediumDetects attempts to enable the Windows scheduled tasks AT command via registry modification.
Scheduled Tasks AT Command Usage
lowDetects the use of the AT command to schedule tasks, which may indicate malicious activity.
Detection queries are kept inside the platform. Get full rules →