<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Scheduled-Task — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/scheduled-task/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 04 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/scheduled-task/feed.xml" rel="self" type="application/rss+xml"/><item><title>UAC Bypass via DiskCleanup Scheduled Task Hijack</title><link>https://feed.craftedsignal.io/briefs/2024-01-uac-bypass-diskcleanup/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-uac-bypass-diskcleanup/</guid><description>Attackers bypass User Account Control (UAC) by hijacking the DiskCleanup Scheduled Task to stealthily execute code with elevated permissions on Windows systems.</description><content:encoded><![CDATA[<p>This rule identifies User Account Control (UAC) bypass attempts via hijacking the DiskCleanup Scheduled Task. Attackers exploit this method to execute code with elevated privileges, bypassing standard security controls. The technique involves leveraging the <code>cleanmgr.exe</code> or <code>taskhostw.exe</code> executables with specific arguments (<code>/autoclean</code> and <code>/d</code>) outside of their expected paths. This allows attackers to run malicious code under the guise of a legitimate system process, making detection more challenging. This technique is used to gain elevated privileges on a compromised system, allowing for further malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., via phishing or exploiting a software vulnerability).</li>
<li>The attacker modifies or creates a scheduled task to execute <code>cleanmgr.exe</code> or <code>taskhostw.exe</code> with the <code>/autoclean</code> and <code>/d</code> arguments.</li>
<li>The modified scheduled task is triggered, executing the specified executable with the supplied arguments.</li>
<li>The executable, such as <code>cleanmgr.exe</code>, attempts to run Disk Cleanup.</li>
<li>If the executable path is outside the standard locations (e.g., <code>C:\\Windows\\System32</code> or <code>C:\\Windows\\SysWOW64</code>), it indicates a potential hijack.</li>
<li>Malicious code is executed with elevated privileges due to the UAC bypass.</li>
<li>The attacker uses these elevated privileges to install malware, modify system settings, or perform other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass User Account Control (UAC) and execute code with elevated privileges. This can lead to the installation of malware, modification of system settings, data theft, and other malicious activities. While the exact number of victims is unknown, this technique is effective on systems where UAC is enabled but misconfigured or vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;UAC Bypass via DiskCleanup with Suspicious Path&rdquo; to your SIEM and tune for your environment to detect UAC bypass attempts.</li>
<li>Deploy the Sigma rule &ldquo;UAC Bypass via DiskCleanup and Taskhostw&rdquo; to your SIEM to detect UAC bypass attempts.</li>
<li>Monitor process creation events for <code>cleanmgr.exe</code> and <code>taskhostw.exe</code> with the <code>/autoclean</code> and <code>/d</code> arguments, focusing on executions outside the standard system directories.</li>
<li>Review and harden scheduled tasks to prevent unauthorized modifications.</li>
<li>Ensure that UAC settings are properly configured and enforced across the organization.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>uac-bypass</category><category>privilege-escalation</category><category>windows</category><category>diskcleanup</category><category>scheduled-task</category></item><item><title>Unusual Scheduled Task Update</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-scheduled-task-update/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-scheduled-task-update/</guid><description>This rule detects modifications to scheduled tasks by user accounts, excluding system activity and machine accounts, which adversaries can exploit for persistence by modifying them to execute malicious code.</description><content:encoded><![CDATA[<p>This detection identifies first-time modifications to scheduled tasks by non-system users on Windows systems. Adversaries frequently abuse scheduled tasks to achieve persistence by modifying existing tasks or creating new ones that execute malicious code at recurring intervals. This rule focuses on detecting unauthorized changes to existing tasks by filtering out known system accounts (SYSTEM, Local Service, Network Service) and machine accounts, thereby highlighting potentially suspicious user activity. The rule leverages Windows Security Event Logs (event code 4702) to monitor task modifications. The goal is to aid in the early detection of threats where attackers are attempting to establish persistence on a compromised system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker enumerates existing scheduled tasks on the system using tools like <code>schtasks.exe</code> or PowerShell cmdlets.</li>
<li>The attacker identifies a suitable scheduled task to modify for persistence.</li>
<li>The attacker modifies the task&rsquo;s settings, such as the trigger time, the executable to run, or the arguments passed to the executable. This modification is logged as event ID 4702.</li>
<li>The scheduled task is updated using <code>schtasks.exe /change</code> or PowerShell&rsquo;s <code>Set-ScheduledTask</code> cmdlet.</li>
<li>The modified scheduled task executes at the specified time, launching the attacker&rsquo;s malicious payload.</li>
<li>The malicious payload establishes a reverse shell to the attacker&rsquo;s command and control (C2) server.</li>
<li>The attacker uses the reverse shell to perform further actions on the compromised system, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack involving the modification of scheduled tasks can lead to persistent access to a compromised system. The attacker can use this access to steal sensitive data, install malware, or perform other malicious activities. While this rule is low severity, it can uncover attackers attempting to persist in a network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Other Object Access Events&rdquo; to generate the required Windows Security Event Logs (event ID 4702) as described in the setup instructions.</li>
<li>Deploy the Sigma rule provided below to your SIEM to detect unusual scheduled task updates.</li>
<li>Investigate any alerts generated by this rule to determine if the scheduled task modification is legitimate or malicious.</li>
<li>Review the references provided to understand the underlying event IDs and attacker techniques related to scheduled tasks.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>scheduled-task</category><category>windows</category></item><item><title>Schtasks Run Task On Demand</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-schtasks-on-demand/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-schtasks-on-demand/</guid><description>Detection of on-demand execution of Windows Scheduled Tasks via the schtasks.exe command-line utility, a common technique for persistence and lateral movement.</description><content:encoded><![CDATA[<p>This analytic detects the execution of Windows Scheduled Tasks on demand using the <code>schtasks.exe</code> utility. The detection focuses on identifying <code>schtasks.exe</code> being executed with the <code>run</code> command, which is often used by adversaries to force the execution of previously created scheduled tasks. This activity is significant because attackers frequently leverage scheduled tasks for persistent access, privilege escalation, or lateral movement within a compromised network. Detecting this behavior can help defenders identify and respond to malicious activity before it leads to further compromise. The technique has been associated with various threat actors and malware families including Qakbot, XMRig, and Medusa Ransomware as well as campaigns such as CISA AA22-257A and Industroyer2.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through various means (e.g., exploiting a vulnerability, phishing).</li>
<li>The attacker establishes persistence by creating a new scheduled task using <code>schtasks.exe</code>.</li>
<li>The attacker uses <code>schtasks.exe</code> with the <code>run</code> command to trigger the malicious scheduled task on demand.</li>
<li>The scheduled task executes a malicious payload, such as a script or executable.</li>
<li>The payload may perform various malicious actions, such as downloading additional malware, escalating privileges, or gathering sensitive information.</li>
<li>The attacker moves laterally to other systems on the network by creating and running scheduled tasks remotely.</li>
<li>The attacker attempts to disable security controls or evade detection by modifying existing scheduled tasks.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to persistent access, lateral movement, and privilege escalation within the compromised environment. Attackers can use this technique to maintain a foothold on the system, spread malware to other systems on the network, and ultimately achieve their objectives, such as data theft, ransomware deployment, or disruption of critical services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect the execution of <code>schtasks.exe</code> with the <code>run</code> command, tuning it to exclude known legitimate uses.</li>
<li>Investigate any detected instances of <code>schtasks.exe</code> execution with the <code>run</code> command to determine if they are malicious.</li>
<li>Monitor process execution data for unusual or unexpected processes being launched by scheduled tasks.</li>
<li>Implement strict access controls and regularly review and audit scheduled tasks to prevent unauthorized modifications or creations.</li>
<li>Enable Sysmon process-creation logging (Event ID 1) to capture detailed information about process executions, including command-line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>schtasks</category><category>scheduled-task</category><category>persistence</category><category>execution</category></item><item><title>Scheduled Task Creation via Scripting</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-scheduled-task-scripting/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-scheduled-task-scripting/</guid><description>Detection of scheduled task creation by Windows scripting engines like cscript.exe, wscript.exe, or powershell.exe, used by adversaries to establish persistence on compromised systems.</description><content:encoded><![CDATA[<p>This rule detects the creation of scheduled tasks by Windows scripting engines, a tactic commonly employed by adversaries to establish persistence on compromised systems. The activity involves monitoring registry changes related to scheduled task actions and correlating them with script execution. Specifically, it looks for instances where cscript.exe, wscript.exe, powershell.exe, pwsh.exe or powershell_ise.exe are used to create or modify scheduled tasks. This behavior can be indicative of malicious activity, as legitimate software installations should not typically involve scripting engines directly creating scheduled tasks. Defenders should investigate any instances of this behavior to determine if it is malicious. The rule focuses on Windows environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through various means (e.g., phishing, exploit).</li>
<li>The attacker executes a script (e.g., PowerShell, VBScript) on the target system.</li>
<li>The script interacts with the <code>taskschd.dll</code> library to create or modify a scheduled task.</li>
<li>The script modifies the registry key <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\*\Actions</code> or <code>\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\*\Actions</code> to define the actions performed by the scheduled task.</li>
<li>The scheduled task is configured to execute a malicious payload at a specific time or event.</li>
<li>The scheduled task executes, providing the attacker with persistent access to the system.</li>
<li>The attacker leverages the persistent access to perform further malicious activities, such as lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to persistence on the compromised system, allowing attackers to maintain access even after reboots or user logoffs. This can facilitate long-term data theft, deployment of ransomware, or further compromise of the network. The impact depends on the privileges of the account under which the scheduled task runs, potentially granting SYSTEM level access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon ImageLoad events (Event ID 7) to detect when <code>taskschd.dll</code> is loaded by scripting engines (powershell.exe, cscript.exe, wscript.exe) as described in the <a href="https://ela.st/sysmon-event-7-setup">Sysmon Event ID 7 setup guide</a>.</li>
<li>Enable Sysmon Registry Events to monitor changes to the registry paths associated with scheduled task actions as described in the <a href="https://ela.st/sysmon-event-reg-setup">Sysmon Registry Events setup guide</a>.</li>
<li>Deploy the provided Sigma rules to your SIEM to detect scheduled task creation by scripting engines and tune for your environment.</li>
<li>Investigate any alerts generated by these rules, focusing on the specific scripts and scheduled tasks involved.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>scheduled-task</category><category>windows</category></item><item><title>GPO Scheduled Task Abuse for Privilege Escalation and Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-gpo-scheduled-task-abuse/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-gpo-scheduled-task-abuse/</guid><description>Attackers abuse Group Policy Objects by modifying scheduled task attributes to execute malicious commands across objects controlled by the GPO, potentially leading to privilege escalation and lateral movement.</description><content:encoded><![CDATA[<p>Attackers can abuse Group Policy Objects (GPOs) to execute scheduled tasks at scale, compromising objects controlled by a given GPO. This involves modifying the contents of the <code>&lt;GPOPath&gt;\\Machine\\Preferences\\ScheduledTasks\\ScheduledTasks.xml</code> file. By altering the XML file to include malicious commands, attackers can achieve privilege escalation or lateral movement within the domain. This technique leverages a legitimate Active Directory mechanism, making it essential to differentiate between authorized administrative actions and malicious activities. The modification can be identified through changes to <code>gPCMachineExtensionNames</code> or <code>gPCUserExtensionNames</code> attributes within Active Directory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system with permissions to modify GPOs.</li>
<li>Attacker modifies the <code>ScheduledTasks.xml</code> file within the SYSVOL share of a targeted GPO (<code>\\\\*\\SYSVOL</code>).</li>
<li>The attacker changes the contents of the XML file to include a malicious <code>&lt;Command&gt;</code> and <code>&lt;Arguments&gt;</code> tag.</li>
<li>The modified GPO is replicated to domain controllers.</li>
<li>Target systems receive the updated GPO during regular group policy refresh cycles.</li>
<li>The scheduled task defined in the modified <code>ScheduledTasks.xml</code> is executed on the target systems.</li>
<li>The malicious command executes, potentially escalating privileges or facilitating lateral movement.</li>
<li>Attacker achieves desired objective, such as installing malware, creating new accounts, or exfiltrating data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code on systems managed by the modified GPO. The scope of impact depends on the targeted GPO and the permissions of the scheduled task. This can lead to widespread compromise, affecting numerous systems and users within the domain. The modification of GPOs can be difficult to detect without proper monitoring, potentially allowing attackers to maintain persistence and control over the environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and monitor Windows audit policies for &ldquo;Audit Directory Service Changes&rdquo; and &ldquo;Audit Detailed File Share&rdquo; to detect modifications to GPOs and file share access, as outlined in the <a href="#setup">setup</a> section.</li>
<li>Deploy the Sigma rule &ldquo;Scheduled Task Execution via GPO Attribute Modification&rdquo; to detect modifications to the <code>gPCMachineExtensionNames</code> or <code>gPCUserExtensionNames</code> attributes (rule: <code>Scheduled Task Execution via GPO Attribute Modification</code>).</li>
<li>Deploy the Sigma rule &ldquo;Scheduled Task XML File Modification in SYSVOL&rdquo; to detect modifications to the ScheduledTasks.xml file in SYSVOL shares (rule: <code>Scheduled Task XML File Modification in SYSVOL</code>).</li>
<li>Review and validate any changes to GPOs, specifically those related to scheduled tasks, to ensure they are authorized and legitimate.</li>
<li>Monitor for the execution of unexpected or malicious commands originating from scheduled tasks created or modified via GPOs.</li>
<li>Regularly audit and review GPO configurations to identify any potential weaknesses or misconfigurations that could be exploited.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>group-policy</category><category>scheduled-task</category><category>privilege-escalation</category><category>lateral-movement</category></item><item><title>Detecting Remote Scheduled Task Creation for Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-scheduled-task-creation/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-scheduled-task-creation/</guid><description>This rule identifies remote scheduled task creations on a target Windows host, potentially indicating lateral movement by adversaries, by monitoring network connections and registry modifications related to task scheduling.</description><content:encoded><![CDATA[<p>This detection identifies remote scheduled task creations on a target host, which can be indicative of lateral movement. Adversaries often leverage scheduled tasks to execute malicious commands, maintain persistence, or escalate privileges. This technique is particularly effective as it uses native Windows functionality, making it harder to distinguish from legitimate administrative actions. This rule is designed for data generated by Elastic Defend and also supports third-party data sources such as SentinelOne Cloud Funnel and Sysmon. Understanding when and how scheduled tasks are created remotely is crucial for detecting and responding to potential intrusions. The rule focuses on network connections from svchost.exe and registry modifications related to task actions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker uses the compromised system to scan the network for potential targets.</li>
<li>The attacker attempts to authenticate to a target Windows host using stolen credentials or by exploiting a vulnerability in a network service.</li>
<li>The attacker establishes a network connection to the target host&rsquo;s Task Scheduler service, typically using ports in the dynamic port range (49152+). This connection originates from svchost.exe.</li>
<li>The attacker creates a new scheduled task on the target system using the Task Scheduler service.</li>
<li>This creation involves modifying the registry key <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{TaskID}\Actions</code> to define the task&rsquo;s actions. The &lsquo;Actions&rsquo; value is often base64 encoded.</li>
<li>The scheduled task executes a malicious payload, granting the attacker further access or control over the target system.</li>
<li>The attacker uses the newly gained access for lateral movement, data exfiltration, or other malicious objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive systems, data breaches, and further lateral movement within the network. The rule is designed to catch this activity, reducing the dwell time of attackers and minimizing potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to your SIEM and tune for your environment to detect malicious scheduled task creation.</li>
<li>Enable Sysmon Event ID 3 (Network Connection) and Sysmon Registry Events to enhance visibility into network connections and registry modifications (see Setup instructions).</li>
<li>Review the base64 encoded tasks actions registry value to investigate the task configured action (see rule description).</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the scheduled task creation and the intent behind the configured action.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>execution</category><category>windows</category><category>scheduled-task</category></item><item><title>Windows Scheduled Task Creation for Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-scheduled-task-creation/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-scheduled-task-creation/</guid><description>Adversaries may create scheduled tasks on Windows systems to establish persistence, move laterally, or escalate privileges, and this detection identifies such activity by monitoring Windows event logs for scheduled task creation events, excluding known benign tasks and those created by system accounts.</description><content:encoded><![CDATA[<p>Adversaries frequently leverage scheduled tasks in Windows to maintain persistence, elevate privileges, or facilitate lateral movement within a compromised network. This technique involves creating or modifying scheduled tasks to execute malicious code at specific times or intervals. The detection rule focuses on identifying the creation of new scheduled tasks logged in Windows event logs, filtering out tasks created by system accounts and those associated with legitimate software to minimize false positives. This detection is crucial because successful exploitation allows attackers to execute arbitrary commands or programs on a recurring basis, maintaining a foothold even after system reboots or user logoffs. Defenders need to monitor for anomalous task creation events to identify potential malicious activity. The rule references Microsoft Event ID 4698 as a key data source for detecting scheduled task creation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to the system through phishing, exploiting a vulnerability, or using compromised credentials.</li>
<li><strong>Privilege Escalation (if needed):</strong> The attacker escalates privileges using exploits or by abusing misconfigurations to gain the necessary permissions to create scheduled tasks.</li>
<li><strong>Task Creation:</strong> The attacker creates a new scheduled task using tools like <code>schtasks.exe</code> or PowerShell.</li>
<li><strong>Configuration:</strong> The attacker configures the task to execute a malicious script or program at a specific time or event trigger.</li>
<li><strong>Persistence:</strong> The scheduled task is configured to run at regular intervals or upon system startup, ensuring persistent access to the compromised system.</li>
<li><strong>Execution:</strong> When the scheduled task triggers, the malicious payload executes, performing actions such as installing malware, stealing data, or establishing a command and control connection.</li>
<li><strong>Lateral Movement (optional):</strong> The attacker uses the compromised system and scheduled task to move laterally to other systems on the network, repeating the task creation process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via scheduled task creation can lead to persistent access within the compromised environment. The attacker can maintain a foothold even after system restarts, enabling them to perform data exfiltration, deploy ransomware, or cause other disruptive activities. While the risk score is relatively low, the potential for persistence makes this a critical area to monitor, especially in environments where lateral movement is a significant concern. The number of affected systems depends on the scope of the initial compromise and the attacker&rsquo;s ability to move laterally.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Other Object Access Events&rdquo; to generate the necessary Windows Security Event Logs for detecting scheduled task creation (reference: setup instructions in the original rule).</li>
<li>Deploy the provided Sigma rules to your SIEM to detect suspicious scheduled task creation events, and tune the rules by adding exclusions for known benign tasks in your environment.</li>
<li>Review the investigation steps outlined in the rule&rsquo;s notes to triage alerts related to scheduled task creation, focusing on unfamiliar task names, unusual user accounts, and suspicious scheduled actions.</li>
<li>Use the <code>references</code> URL to understand the specific details of Windows Event ID 4698, which is generated when a scheduled task is created.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>scheduled-task</category><category>windows</category></item></channel></rss>