Scheduled Tasks Used In Badrabbit Ransomware

Description

This search looks for flags passed to schtasks.exe on the command-line that indicate that task names related to the execution of Bad Rabbit ransomware were created or deleted.

Content Mapping

This content is not mapped to any local saved search. Add mapping


Use Case

Security Monitoring

Category

Ransomware

Alert Volume

This search looks for flags passed to schtasks.exe on the command-line that indicate that task names related to the execution of Bad Rabbit ransomware were created or deleted.

SPL Difficulty

None

Journey

Stage 3

MITRE ATT&CK Tactics

Execution
Persistence
Privilege Escalation

MITRE ATT&CK Techniques

Scheduled Task/Job

Scheduled Task

MITRE Threat Groups

APT-C-36
APT29
APT3
APT32
APT33
APT39
APT41
BRONZE BUTLER
Blue Mockingbird
Chimera
Cobalt Group
Dragonfly 2.0
FIN10
FIN6
FIN7
FIN8
Frankenstein
Gamaredon Group
Machete
MuddyWater
OilRig
Patchwork
Rancor
Silence
Soft Cell
Stealth Falcon
TEMP.Veles
Wizard Spider
menuPass

Kill Chain Phases

Actions On Objectives

Data Sources

Endpoint Detection and Response

   Help

Scheduled Tasks Used In Badrabbit Ransomware Help

You must be ingesting data that records process activity from your hosts to populate the Endpoint data model in the Processes node. You must also be ingesting logs with both the process name and command line from your endpoints. The command-line arguments are mapped to the "process" field in the Endpoint data model.

   Search

Open in Search