
Rule Info
Name
Suspicious Scheduled Task Creation of Legitimate MSC File - Process
Author
Swachchhanda Shrawan Poudel (Nextron Systems)
Description
Detects the creation of suspicious Windows Scheduled Tasks via `schtasks.exe`, related to .msc files such as 'CompMgmt' or 'eventvwr'.
These are legitimate Windows services, but during their execution, they check the registry key
`HKCU\Software\Classes\mscfile\shell\open\command` to determine the location of `mmc.exe`,
which is used to open the `eventvwr.msc` or `CompMgmt.msc`. If the registry value is modified to point to a malicious binary,
that binary will be executed instead of `mmc.exe` as a privileged process, bypassing the UAC prompt.
Adversaries could exploit this by modifying the `HKCU\Software\Classes\mscfile\shell\open\command` registry key to point to a malicious binary,
allowing it to run with elevated privileges without user consent bypassing UAC.
For persistence, they could create a scheduled task of these services to ensure the malicious binary is executed.
Therefore, it is also recommended to verify whether the registry value has been tampered with or not to verify malicious activity.
Date
2025-03-07 00:00:00
Modified
None
Id
a20b230f-4163-4cb8-bc53-1fca0ae34bdd
Tags
attack.persistence attack.t1053.005 attack.privilege-escalation attack.defense-evasion attack.t1548.002
Type
Nextron Sigma feed only (private)