<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>HP Support Assistant — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/hp-support-assistant/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/hp-support-assistant/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Scheduled Task Creation for Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-scheduled-task-creation/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-scheduled-task-creation/</guid><description>Adversaries may create scheduled tasks on Windows systems to establish persistence, move laterally, or escalate privileges, and this detection identifies such activity by monitoring Windows event logs for scheduled task creation events, excluding known benign tasks and those created by system accounts.</description><content:encoded><![CDATA[<p>Adversaries frequently leverage scheduled tasks in Windows to maintain persistence, elevate privileges, or facilitate lateral movement within a compromised network. This technique involves creating or modifying scheduled tasks to execute malicious code at specific times or intervals. The detection rule focuses on identifying the creation of new scheduled tasks logged in Windows event logs, filtering out tasks created by system accounts and those associated with legitimate software to minimize false positives. This detection is crucial because successful exploitation allows attackers to execute arbitrary commands or programs on a recurring basis, maintaining a foothold even after system reboots or user logoffs. Defenders need to monitor for anomalous task creation events to identify potential malicious activity. The rule references Microsoft Event ID 4698 as a key data source for detecting scheduled task creation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to the system through phishing, exploiting a vulnerability, or using compromised credentials.</li>
<li><strong>Privilege Escalation (if needed):</strong> The attacker escalates privileges using exploits or by abusing misconfigurations to gain the necessary permissions to create scheduled tasks.</li>
<li><strong>Task Creation:</strong> The attacker creates a new scheduled task using tools like <code>schtasks.exe</code> or PowerShell.</li>
<li><strong>Configuration:</strong> The attacker configures the task to execute a malicious script or program at a specific time or event trigger.</li>
<li><strong>Persistence:</strong> The scheduled task is configured to run at regular intervals or upon system startup, ensuring persistent access to the compromised system.</li>
<li><strong>Execution:</strong> When the scheduled task triggers, the malicious payload executes, performing actions such as installing malware, stealing data, or establishing a command and control connection.</li>
<li><strong>Lateral Movement (optional):</strong> The attacker uses the compromised system and scheduled task to move laterally to other systems on the network, repeating the task creation process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via scheduled task creation can lead to persistent access within the compromised environment. The attacker can maintain a foothold even after system restarts, enabling them to perform data exfiltration, deploy ransomware, or cause other disruptive activities. While the risk score is relatively low, the potential for persistence makes this a critical area to monitor, especially in environments where lateral movement is a significant concern. The number of affected systems depends on the scope of the initial compromise and the attacker&rsquo;s ability to move laterally.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Other Object Access Events&rdquo; to generate the necessary Windows Security Event Logs for detecting scheduled task creation (reference: setup instructions in the original rule).</li>
<li>Deploy the provided Sigma rules to your SIEM to detect suspicious scheduled task creation events, and tune the rules by adding exclusions for known benign tasks in your environment.</li>
<li>Review the investigation steps outlined in the rule&rsquo;s notes to triage alerts related to scheduled task creation, focusing on unfamiliar task names, unusual user accounts, and suspicious scheduled actions.</li>
<li>Use the <code>references</code> URL to understand the specific details of Windows Event ID 4698, which is generated when a scheduled task is created.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>scheduled-task</category><category>windows</category></item><item><title>Detecting Suspicious Scheduled Task Creation in Windows</title><link>https://feed.craftedsignal.io/briefs/2024-01-scheduled-task-creation/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-scheduled-task-creation/</guid><description>This rule detects the creation of scheduled tasks in Windows using event logs, which adversaries may use for persistence, lateral movement, or privilege escalation by creating malicious tasks.</description><content:encoded><![CDATA[<p>Adversaries frequently abuse Windows scheduled tasks to establish persistence, move laterally within a network, and escalate privileges. This technique involves creating or modifying scheduled tasks to execute malicious code at specific times or in response to certain events. This detection rule identifies suspicious task creation by filtering out benign tasks and those initiated by system accounts, focusing on potential threats. The rule relies on Windows Security Event Logs, offering a valuable method for identifying unauthorized task creation indicative of malicious activity. The detection logic specifically excludes common tasks associated with software updates from vendors like Hewlett-Packard, Microsoft, Google, and Mozilla, as well as tasks run by system accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker uses their initial access to execute commands, potentially leveraging PowerShell or cmd.exe.</li>
<li>The attacker uses the <code>schtasks</code> command-line utility or the COM interface to create a new scheduled task.</li>
<li>The scheduled task is configured to execute a malicious payload, such as a reverse shell or a data exfiltration script.</li>
<li>The task is set to trigger based on a specific schedule, such as at system startup, at a specific time, or upon a specific event.</li>
<li>When the trigger occurs, the scheduled task executes the malicious payload.</li>
<li>The malicious payload establishes persistence, allowing the attacker to maintain access to the compromised system.</li>
<li>The attacker can then use the persistent access to move laterally to other systems or to exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows adversaries to maintain persistent access to compromised systems, potentially leading to data theft, system disruption, or further lateral movement within the network. By creating malicious scheduled tasks, attackers can ensure their code is executed even after a system reboot or user logoff. This can result in long-term compromise and significant damage to affected organizations. While the number of victims and specific sectors targeted are not detailed, the potential impact is broad due to the widespread use of Windows systems in enterprise environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Security Event Logging and ensure that event ID 4698 (A scheduled task was created) is collected.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Scheduled Task Creation via Winlog&rdquo; to your SIEM to detect potentially malicious scheduled task creation events.</li>
<li>Regularly review and update the exclusion list in the Sigma rule to account for new benign scheduled tasks in your environment.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the task&rsquo;s name, path, actions, and triggers to determine if they are suspicious.</li>
<li>Monitor for related suspicious activity, such as unusual process executions or network connections originating from the compromised system.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>scheduled_task</category><category>windows</category></item></channel></rss>