MITRE ATT&CK

Windows Scheduled Tasks allow users to automate the execution of predefined actions based on specified triggers. Attackers often leverage this feature to maintain persistence on a compromised system by scheduling malicious code execution. This can be done through the GUI tool or command-line utilities like schtasks.exe.


Scheduled Tasks as a Persistence Mechanism

How Attackers Use Scheduled Tasks


Creating a Scheduled Task (Example Command)

schtasks /create /tn "mysc" /tr C:\\Users\\Public\\test.exe /sc ONLOGON /ru "System"

Command Breakdown:


Scheduled Tasks in the Registry

All scheduled tasks are registered under the following registry keys: