2023-08-31 17:41:22 +02:00
[ metadata ]
creation_date = "2023/08/30"
2025-01-09 10:59:32 -03:00
integration = [ "endpoint" , "auditd_manager" , "crowdstrike" , "sentinel_one_cloud_funnel" ]
2023-08-31 17:41:22 +02:00
maturity = "production"
2025-01-09 10:59:32 -03:00
min_stack_version = "8.13.0"
min_stack_comments = "Breaking change at 8.13.0 for SentinelOne Integration."
updated_date = "2025/01/07"
2023-08-31 17:41:22 +02:00
[ rule ]
author = [ "Elastic" ]
description = "" "
This rule monitors for potential memory dumping through gdb. Attackers may leverage memory dumping techniques to attempt
2024-05-23 00:45:10 +05:30
secret extraction from privileged processes. Tools that display this behavior include " truffleproc " and
2023-08-31 17:41:22 +02:00
" bash-memory-dump ". This behavior should not happen by default, and should be investigated thoroughly.
" ""
from = "now-9m"
2025-01-09 10:59:32 -03:00
index = [ "logs-endpoint.events.*" , "endgame-*" , "auditbeat-*" , "logs-auditd_manager.auditd-*" , "logs-crowdstrike.fdr*" , "logs-sentinel_one_cloud_funnel.*" ]
2023-08-31 17:41:22 +02:00
language = "eql"
license = "Elastic License v2"
2024-03-06 14:49:42 +01:00
name = "Linux Process Hooking via GDB"
2024-05-23 00:45:10 +05:30
references = [ "https://github.com/controlplaneio/truffleproc" , "https://github.com/hajzer/bash-memory-dump" ]
2023-08-31 17:41:22 +02:00
risk_score = 21
rule_id = "66c058f3-99f4-4d18-952b-43348f2577a0"
severity = "low"
2024-03-06 14:49:42 +01:00
tags = [
2024-05-23 00:45:10 +05:30
"Domain: Endpoint" ,
"OS: Linux" ,
"Use Case: Threat Detection" ,
"Tactic: Credential Access" ,
"Data Source: Elastic Defend" ,
"Data Source: Elastic Endgame" ,
"Data Source: Auditd Manager" ,
2025-01-09 10:59:32 -03:00
"Data Source: Crowdstrike" ,
"Data Source: SentinelOne" ,
2024-05-23 00:45:10 +05:30
]
2023-08-31 17:41:22 +02:00
timestamp_override = "event.ingested"
type = "eql"
2024-05-23 00:45:10 +05:30
2023-08-31 17:41:22 +02:00
query = '' '
2025-01-09 10:59:32 -03:00
process where host.os.type == "linux" and event.type == "start" and event.action in ("exec", "exec_event", "start", "ProcessRollup2", "executed", "process_started")
2024-03-13 10:11:21 +01:00
and process.name == "gdb" and process.args in ("--pid", "-p") and
2023-08-31 17:41:22 +02:00
/* Covered by d4ff2f53-c802-4d2e-9fb9-9ecc08356c3f */
process.args != "1"
' ''
2024-05-23 00:45:10 +05:30
2023-08-31 17:41:22 +02:00
[ [ rule . threat ] ]
framework = "MITRE ATT&CK"
[ [ rule . threat . technique ] ]
id = "T1003"
name = "OS Credential Dumping"
reference = "https://attack.mitre.org/techniques/T1003/"
[ [ rule . threat . technique . subtechnique ] ]
id = "T1003.007"
name = "Proc Filesystem"
reference = "https://attack.mitre.org/techniques/T1003/007/"
2024-05-23 00:45:10 +05:30
2023-08-31 17:41:22 +02:00
[ rule . threat . tactic ]
id = "TA0006"
name = "Credential Access"
reference = "https://attack.mitre.org/tactics/TA0006/"
2024-05-23 00:45:10 +05:30