<<< Hide Navigation Hide TOC >>>
Scheduled Task Executing Encoded Payload from Registry (c4eeeeae-89f4-43a7-8b48-8d1bdfa66c78)
Detects the creation of a schtask that potentially executes a base64 encoded payload stored in the Windows Registry using PowerShell.
Cluster A![]() |
Galaxy A![]() |
Cluster B![]() |
Galaxy B![]() |
Level![]() |
---|---|---|---|---|
PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) | Attack Pattern | Scheduled Task Executing Encoded Payload from Registry (c4eeeeae-89f4-43a7-8b48-8d1bdfa66c78) | Sigma-Rules | 1 |
Scheduled Task - T1053.005 (005a06c6-14bf-4118-afa0-ebcd8aebb0c9) | Attack Pattern | Scheduled Task Executing Encoded Payload from Registry (c4eeeeae-89f4-43a7-8b48-8d1bdfa66c78) | Sigma-Rules | 1 |
Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) | Attack Pattern | PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) | Attack Pattern | 2 |
Scheduled Task/Job - T1053 (35dd844a-b219-4e2b-a6bb-efa9a75995a9) | Attack Pattern | Scheduled Task - T1053.005 (005a06c6-14bf-4118-afa0-ebcd8aebb0c9) | Attack Pattern | 2 |