Tactic | Technique ID | Technique Name | Sub-Technique Name | Platforms | Permissions Required |
---|---|---|---|---|---|
Execution, Persistence, Privilege Escalation | T1053 | Scheduled Task/Job | Containers, Linux, Windows, macOS | Administrator, SYSTEM, User |
Investigate, remediate (contain, eradicate), and communicate in parallel!
Assign steps to individuals or teams to work concurrently, when possible; this playbook is not purely sequential. Use your best judgment.
- Scope of the attack
- gather IOCs on the task and see, if there are multiple assets affected.
- analyze log files to get a better understanding, how the task was created and clarify attack vector.
- analyze if the user, which created the task, did other actions on assets
- Analyze task creation
- creation timestamp of the task
- user that created the task
- rights of the user
- Analyze the task
- called binaries
- provided parameters
- frequency in which the task is called
- more IOCs for analyzing the scope of the attack
- Determine Severity
- number of affected assets
- indicators of users compromised
- data at risk
- clear path of attack
- Plan remediation events where these steps are launched together (or in coordinated fashion), with appropriate teams ready to respond to any disruption.
- Consider the timing and trade-offs of remediation actions: your response has consequences.
- Originating account
- lock the account which created the task
- change the password of the account and in all locations, where the same password was used
- Disable the task and prevent re-creation
- disable the task
- block other ways of task creation identified by the investigation
- Automated blocking
- if in an highly controlled environment with good baseline-images, consider blocking unknown services on creation
- Remove task
- if it is clear how the task was created and what it did, you can remove it
- Reset asset to an clean state
- as an alternative, consider restoring an old image or re-imaging the asset
- Resources need strongly depend on the complexity of the task and the overall attack.
In addition to the general steps and guidance in the incident response plan:
- Should be covered in default response plan
In addition to the general steps and guidance in the incident response plan:
- Monitoring
- monitor the environment more closely for the creation of tasks over the upcoming weeks.
- Follow default lessons learned procedures
- MITRE T1053