LoFP LoFP / installers are known to create scheduled tasks via xml. apply additional filters as needed.

Techniques

Sample rules

Windows Scheduled Task Created Via XML

Description

The following analytic detects the creation of scheduled tasks in Windows using schtasks.exe with the “XML” parameter. This detection leverages data from Endpoint Detection and Response (EDR) agents, focusing on command-line executions and process details. This activity is significant as it is a common technique for establishing persistence or achieving privilege escalation, often used by malware like Trickbot and Winter-Vivern. While creating a scheduled task via XML may be legitimate, it can also be abused by attackers. If confirmed malicious, this could allow attackers to maintain access, execute additional payloads, and potentially lead to data theft or ransomware deployment.

Detection logic


| tstats `security_content_summariesonly` 
  count min(_time) as firstTime
        max(_time) as lastTime

from datamodel=Endpoint.Processes where 

`process_schtasks`
Processes.process IN ("* /create *", "* -create *")
Processes.process IN ("* /xml *", "* -xml *")

by Processes.action Processes.dest Processes.original_file_name Processes.parent_process 
   Processes.parent_process_exec Processes.parent_process_guid Processes.parent_process_id 
   Processes.parent_process_name Processes.parent_process_path Processes.process Processes.process_exec 
   Processes.process_guid Processes.process_hash Processes.process_id Processes.process_integrity_level 
   Processes.process_name Processes.process_path Processes.user Processes.user_id Processes.vendor_product


| `drop_dm_object_name(Processes)` 

| `security_content_ctime(firstTime)` 

| `security_content_ctime(lastTime)`

| `windows_scheduled_task_created_via_xml_filter`