Suspicious process execution by scheduled task

Cortex XDR Analytics Alert Reference by Alert name

Product
Cortex XDR
Last date published
2025-10-27
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

2 Days

Required Data

  • Requires:
    • XDR Agent

Detection Modules

Detector Tags

ATT&CK Tactic

Persistence (TA0003)

ATT&CK Technique

Scheduled Task/Job (T1053)

Severity

Low

Response playbooks

Variations of this detector that create incidents have an OOTB response playbook included in the Cortex Response and Remediation Pack

Description

An unpopular unsigned process was executed by a scheduled task.

Attacker's Goals

Attackers may attempt to gain persistence on the endpoint using scheduled tasks.

Investigative actions

  • Review the process executed by the schedule task.
  • Investigate the specific scheduled task execution chain.

Variations

Suspicious process execution by scheduled task on a sensitive server

Synopsis

ATT&CK Tactic

Persistence (TA0003)

ATT&CK Technique

Scheduled Task/Job (T1053)

Severity

Medium

Response playbooks

Suspicious process execution by scheduled task on a sensitive server

Description

An unpopular unsigned process was executed by a scheduled task.

Attacker's Goals

Attackers may attempt to gain persistence on the endpoint using scheduled tasks.

Investigative actions

  • Review the process executed by the schedule task.
  • Investigate the specific scheduled task execution chain.