<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CCleaner — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/ccleaner/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 09 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/ccleaner/feed.xml" rel="self" type="application/rss+xml"/><item><title>Persistence via Scheduled Job Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-scheduled-job-persistence/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-scheduled-job-persistence/</guid><description>This detection rule identifies attempts to establish persistence on Windows systems by creating scheduled jobs in the Windows Tasks directory, excluding known legitimate jobs.</description><content:encoded><![CDATA[<p>Adversaries may abuse scheduled tasks to maintain persistence on a compromised system. This involves creating or modifying scheduled tasks to execute malicious code at specific times or intervals. This activity can be used to ensure that the attacker&rsquo;s code remains active even after a system restart or user logout. The detection rule identifies suspicious job creation by monitoring specific file paths and extensions, excluding known legitimate processes to flag potential abuse. The rule is designed for data generated by Elastic Defend, but also supports Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker attempts to establish persistence.</li>
<li>The attacker uses a script or program to create a new scheduled job within the <code>C:\Windows\Tasks\</code> directory.</li>
<li>The scheduled job is configured to execute a malicious payload at a specified time or interval.</li>
<li>The malicious payload could be a script (e.g., PowerShell) or an executable.</li>
<li>The scheduled job executes, triggering the malicious payload.</li>
<li>The attacker maintains persistent access to the system.</li>
<li>The attacker performs malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain a persistent presence on the compromised system. This allows them to execute malicious code, steal sensitive information, or perform other malicious activities over an extended period. The number of affected systems can vary depending on the scope of the initial compromise and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 11 (File Create) logging to monitor file creation events on Windows systems.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Scheduled Job Creation&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on scheduled jobs created in the <code>C:\Windows\Tasks\</code> directory with a &ldquo;.job&rdquo; extension.</li>
<li>Review and update exclusion lists for known legitimate scheduled job creation processes (e.g., CCleaner, ManageEngine) to minimize false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>windows</category></item></channel></rss>