Raccine Scheduled Task Deletion via Schtasks
Detection of adversaries deleting the Raccine Rules Updater scheduled task via `schtasks.exe` to disable the ransomware protection tool, potentially leading to data encryption and loss.
This brief focuses on detecting the deletion of the Raccine Rules Updater scheduled task, a critical action that adversaries may take to disable Raccine, a security tool designed to prevent ransomware attacks. The deletion is typically performed using the schtasks.exe command. This activity is significant because successful deletion of the Raccine scheduled task allows ransomware to execute unimpeded, leading to potential data encryption and data loss. The detection leverages endpoint detection and response (EDR) agents and focuses on process names and command-line executions to identify this malicious behavior. Defenders should prioritize monitoring for this activity as it often precedes ransomware deployment.
Attack Chain
- Initial compromise of the target system via unspecified means (e.g., phishing, exploitation of public-facing application).
- Execution of arbitrary commands on the compromised system.
- The adversary uses
schtasks.exeto query the list of scheduled tasks to identify the Raccine Rules Updater task. schtasks.exeis then used with thedeleteparameter to remove the “Raccine Rules Updater” scheduled task.- The operating system removes the scheduled task entry.
- Ransomware is deployed on the system without Raccine’s protection.
- Ransomware encrypts files on local and network shares.
- A ransom note is dropped, demanding payment for decryption.
Impact
Successful deletion of the Raccine scheduled task can lead to a successful ransomware attack. This can result in data encryption, system downtime, and potential financial losses due to ransom payments or recovery costs. The severity of the impact depends on the extent of the data encryption and the organization’s ability to recover from backups. Organizations without Raccine deployed are not directly affected but remain vulnerable to ransomware.
Recommendation
- Deploy the provided Sigma rules to detect the execution of
schtasks.exedeleting tasks containing “Raccine” in the task name or description (schtasks_raccine_deletion). - Enable process monitoring and command-line logging via Sysmon or similar EDR solutions to ensure visibility into process executions.
- Investigate any instances of
schtasks.exebeing used to delete scheduled tasks, especially those related to security tools. - Review and harden scheduled task permissions to prevent unauthorized modifications.
- Monitor parent processes of
schtasks.exefor suspicious activity.
Detection coverage 2
Detect Raccine Scheduled Task Deletion via Schtasks
highDetects the deletion of the Raccine Rules Updater scheduled task using schtasks.exe, indicating a potential attempt to disable ransomware protection.
Detect Raccine Scheduled Task Deletion - Parent Process
highDetects suspicious parent processes spawning schtasks.exe to delete Raccine scheduled tasks, indicating a potential attempt to disable ransomware protection.
Detection queries are kept inside the platform. Get full rules →