Skip to content

This case study documents an advanced persistence technique involving a scheduled task launching base64-encoded PowerShell, used to execute malicious commands without dropping traditional malware to disk.

License

Notifications You must be signed in to change notification settings

Compcode1/ios9-scheduled-task

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

IOC 9 – Scheduled Task Persistence with Encoded PowerShell Overview This case study documents an attacker’s use of Windows-native binaries to establish persistent, fileless execution using Task Scheduler and obfuscated PowerShell. The operation was designed to silently launch a hidden beacon on schedule, relying entirely on legitimate system components to avoid detection.

Key Objectives Demonstrate detection of fileless persistence using host-based triage.

Analyze attacker behavior across OS and OSI layers.

Reinforce technical interpretation with analogies and metaphorical clarity.

Core Detection Flow Triggered by EDR alert: PowerShell process launched by schtasks.exe.

Verified via Event ID 4698 (new scheduled task) and registry Run key.

Script was base64-encoded and executed with hidden window.

Beaconing observed through Invoke-WebRequest to external domain.

Notable Techniques Used Scheduled task configured to run powershell.exe silently.

Payload passed via base64 encoding to avoid basic string detection.

Redundant persistence using both Task Scheduler and Run key.

Fileless execution with no dropped malware binary.

Outcome The scheduled task and registry key were removed. Outbound domains were blocked. The host was isolated and memory-captured for runtime analysis. IOC was logged into central SIEM and a detection rule was created for base64 PowerShell launched from scheduled tasks.

About

This case study documents an advanced persistence technique involving a scheduled task launching base64-encoded PowerShell, used to execute malicious commands without dropping traditional malware to disk.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published