diff --git a/rules/cross-platform/discovery_virtual_machine_fingerprinting_grep.toml b/rules/cross-platform/discovery_virtual_machine_fingerprinting_grep.toml new file mode 100644 index 000000000..9f1a57f0a --- /dev/null +++ b/rules/cross-platform/discovery_virtual_machine_fingerprinting_grep.toml @@ -0,0 +1,51 @@ +[metadata] +creation_date = "2021/09/29" +maturity = "production" +updated_date = "2021/09/29" + +[rule] +author = ["Elastic"] +description = """ +An adversary may attempt to get detailed information about the operating system and hardware. This rule identifies +common locations used to discover virtual machine hardware by a non-root user. This technique has been used by the Pupy +RAT and other malware. +""" +false_positives = [ + """ + Certain tools or automated software may enumerate hardware information. These tools can be exempted via user name or + process arguments to eliminate potential noise. + """, +] +from = "now-9m" +index = ["auditbeat-*", "logs-endpoint.events.*"] +language = "eql" +license = "Elastic License v2" +name = "Virtual Machine Fingerprinting via Grep" +references = ["https://objective-see.com/blog/blog_0x4F.html"] +risk_score = 47 +rule_id = "c85eb82c-d2c8-485c-a36f-534f914b7663" +severity = "medium" +tags = ["Elastic", "Host", "macOS", "Linux", "Threat Detection", "Discovery"] +timestamp_override = "event.ingested" +type = "eql" + +query = ''' +process where event.type == "start" and + process.name in ("grep", "egrep") and user.id != "0" and + process.args : ("parallels*", "vmware*", "virtualbox*") and process.args : "Manufacturer*" and + not process.parent.executable in ("/Applications/Docker.app/Contents/MacOS/Docker", "/usr/libexec/kcare/virt-what") +''' + + +[[rule.threat]] +framework = "MITRE ATT&CK" +[[rule.threat.technique]] +id = "T1082" +name = "System Information Discovery" +reference = "https://attack.mitre.org/techniques/T1082/" + + +[rule.threat.tactic] +id = "TA0007" +name = "Discovery" +reference = "https://attack.mitre.org/tactics/TA0007/"