Scheduled Task (T1053.005) is a MITRE ATT&CK technique in the Persistence tactic. SOC analysts detect it by monitoring for XDR, SIEM events, behavioral anomalies, and the specific indicators described in this detection guide. Practice detection in SOCSimulator Operations.
Adversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malicious code. There are multiple ways to access the Task Scheduler in Windows. The schtasks utility interacts with the Task Scheduler from the command-line. The Task Scheduler can also be opened through the GUI within the System Tools section of the Management Console. The Task Scheduler allows the execution of programs on system startup, on a scheduled basis, or based on event triggers. Many legitimate applications use the Task Scheduler for routine maintenance, updates, and housekeeping. This makes distinguishing malicious scheduled tasks from legitimate ones challenging without examining the command being executed, the account under which the task runs, and whether the creation of the task was authorized through change management processes. Attackers often name tasks to mimic legitimate Windows tasks and use encoded commands to obscure the true nature of the scheduled action.
“Scheduled Task is documented as technique T1053.005 in the MITRE ATT&CK knowledge base under the Persistence tactic. Detection requires visibility into XDR, SIEM telemetry.”
Detection Strategies
The following detection strategies help SOC analysts identify Scheduled Task activity. These methods apply across XDR, SIEM environments and can be implemented as detection rules, correlation queries, or behavioral analytics in your security platform.
1
Examine newly created scheduled task XML definitions for tasks using Base64-encoded PowerShell commands, tasks executing from temporary directories, and tasks configured to run with SYSTEM or elevated account credentials without a business justification.
2
Monitor Windows Event ID 4698 for scheduled task creation and Event ID 4702 for modification, correlating with the creating process and user account to identify tasks created through unusual means such as via mshta.exe or office applications.
3
Detect scheduled tasks created to run at logon or system startup from non-standard paths such as user AppData directories, temporary folders, or ProgramData subdirectories not associated with known software products.
4
Alert on scheduled tasks that download content from the internet during execution, using command lines containing PowerShell Invoke-WebRequest, certutil download flags, or bitsadmin transfer jobs embedded within the task action.
5
Implement baseline comparison for scheduled tasks on server and workstation images, alerting on any tasks present in the environment that do not appear in the approved baseline configuration for that system type.
Example Alerts
These realistic alert examples show what Scheduled Task looks like in your security tools. Use them to tune detection rules and train analysts to recognize true positives versus false positives in live environments.
HighSIEM
Scheduled Task with Encoded PowerShell Created at Startup
Windows Event 4698 recorded creation of scheduled task "MicrosoftEdgeUpdateTaskMachineUA" via schtasks.exe on workstation WS-MKTG-044. Despite the legitimate-sounding name, the task action executes powershell.exe with -EncodedCommand containing a Base64 string that decodes to a Cobalt Strike stager. The task is configured to run at system startup under the SYSTEM account.
HighXDR
Task Scheduler Used for Lateral Movement Execution
Remote scheduled task created on file server FILE-SRV-03 from an external workstation using at.exe with domain administrator credentials. The task executes a batch script uploaded to the ADMIN$ share that installs a backdoor service. Remote task creation combined with the use of domain admin credentials from a non-administrative workstation indicates compromised privileged credentials being leveraged for lateral movement.
CriticalXDR
Scheduled Task Downloading Second-Stage Payload
Scheduled task triggered and executed certutil.exe to download an executable file disguised as a certificate from an external CDN. The task fires every 4 hours and the downloaded payload is immediately executed. This recurring download mechanism ensures the attacker can push updated payloads and maintains persistence even if the initially deployed malware is detected and removed between task execution cycles.
Practice Detecting Scheduled Task
SOCSimulator provides hands-on training rooms where you investigate real-world attack scenarios including Scheduled Task. Build detection skills with zero consequences — free forever.
SOC analysts detect Scheduled Task (T1053.005) by monitoring XDR, SIEM telemetry for behavioral anomalies and specific indicators. Key detection methods include examine newly created scheduled task xml definitions for tasks using base64-encoded powershell commands, tasks executing from temporary directories, a. SOCSimulator provides hands-on practice detecting this technique with realistic alerts.
What security tools are used to detect Scheduled Task?
Scheduled Task can be detected using XDR, SIEM platforms. XDR tools are particularly effective for this technique because they provide visibility into the persistence phase of the attack chain. SOCSimulator simulates all three tool types for hands-on training.
How common is Scheduled Task in real-world attacks?
Scheduled Task is a well-documented MITRE ATT&CK technique in the Persistence tactic. It appears in threat intelligence reports from multiple security vendors and has been observed in campaigns by various threat actor groups. SOCSimulator includes realistic Scheduled Task scenarios based on documented attack patterns, helping analysts build detection intuition.
Can I practice detecting Scheduled Task for free?
Yes. SOCSimulator offers free forever access to training scenarios, including Persistence techniques like Scheduled Task. You can investigate realistic alerts in guided Operations rooms, build detection skills with SIEM, XDR, and Firewall interfaces, and test yourself under pressure in Shift Mode. No credit card required.