Given access to impacted systems and elevated permissions, the operator will enumerate, review, and remove attacker-created or unauthorized scheduled tasks and services designed to maintain persistence or execute malicious code.
Operator Note: Scheduled tasks and unauthorized services are often used by attackers for persistence. Thorough review and cleanup of these artifacts is critical during eradication.
All unauthorized and attacker-created scheduled tasks and services have been identified, validated, removed, and documented. No malicious persistence mechanisms remain.
Get-ScheduledTask | Where-Object {$_.State -ne "Disabled"} | Format-Table TaskName, State, LastRunTime
schtasks /query /fo LIST /v
crontab -l
ls /etc/cron.*
cat /etc/crontab
systemctl list-timers
launchctl list
crontab -l
Operator Note: Pay attention to tasks with non-standard user names, random file names, or unusual execution paths (AppData, Temp folders).
Get-Service | Where-Object {$_.Status -eq "Running"} | Format-Table Name, DisplayName, Status
Get-WmiObject win32_service | Select-Object Name, StartMode, State, PathName
systemctl list-units --type=service --state=running
chkconfig --list
launchctl list
sudo launchctl print system
Criteria for suspicious tasks/services:
Operator Note: Coordinate findings with IR and system/application owners.
Disable-ScheduledTask -TaskName "MaliciousTask"
Unregister-ScheduledTask -TaskName "MaliciousTask" -Confirm:$false
Stop-Service -Name "MaliciousService"
sc.exe delete "MaliciousService"
crontab -r -u attackeruser
sudo rm /etc/cron.d/maliciouscron
sudo systemctl disable malicious.service
sudo systemctl stop malicious.service
sudo rm /etc/systemd/system/malicious.service
sudo launchctl bootout system /Library/LaunchDaemons/malicious.plist
sudo rm /Library/LaunchDaemons/malicious.plist
Get-WmiObject win32_service | Where-Object {$_.PathName -notlike "*Microsoft*"} | Format-Table Name, State, PathName
Operator Note: Focus on non-standard service paths and names during eradication validation.
Tool | Platform | Installation | Usage |
---|---|---|---|
Autoruns (Sysinternals) | Windows | Download from Sysinternals | View all scheduled tasks, services, and persistence |
PowerShell | Windows | Built-in | View, disable, remove scheduled tasks/services |
systemctl / crontab | Linux | Built-in | Manage services and scheduled tasks |
launchctl | macOS | Built-in | Manage launch daemons and agents |
Operator Note: Autoruns is highly recommended for full Windows persistence review during eradication.
Microsoft Sysinternals Autoruns
systemd - Linux Services
Apple macOS launchctl Reference
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.0 | Fully generated operator guide for checking/removing unauthorized scheduled tasks and services with platform guidance | Leo |