Files
sigma-rules/hunting/linux/docs/persistence_via_unusual_system_binary_parent.md
Terrance DeJesus 70411664cf [Bug] Normalize Hunting Index Link Generation (#3872)
* normalizing hunting link generation

* replacing header

* adjusting quotes in f-strings

* added source file to metadata

* removed os dependency

* address bug in source file links

* reverting TOML loading

* change all List type hinting to list

* change all List type hinting to list

* fixed accented characters in queries

* reverted accent character removal; moved macos query and MD to macos folder
2024-07-10 11:01:59 -04:00

1.9 KiB

Unusual System Binary Parent (Potential System Binary Hijacking Attempt)


Metadata

  • Author: Elastic

  • Description: This hunt identifies potential system binary hijacking attempts on Linux systems. It monitors process execution events where common system binaries such as ls, cat, mkdir, touch, mv, and cp are the parent processes. These activities can indicate attempts to hijack system binaries for malicious purposes. The hunt lists detailed information for further analysis and investigation.

  • UUID: d22cbe8f-c84d-4811-aa6d-f1ee00c806b2

  • Integration: endpoint

  • Language: [ES|QL]

  • Source File: Unusual System Binary Parent (Potential System Binary Hijacking Attempt)

Query

from logs-endpoint.events.process-*
| where @timestamp > now() - 30 day
| where host.os.type == "linux" and event.action == "exec" and event.type == "start" and process.parent.name in ("ls", "cat", "mkdir", "touch", "mv", "cp")
| stats cc = count(), host_count = count_distinct(host.name) by process.parent.executable, process.executable
| where host_count <= 5
| sort cc asc
| limit 100

Notes

  • Monitors process execution events where common system binaries such as ls, cat, mkdir, touch, mv, and cp are the parent processes.
  • Focuses on identifying unusual or suspicious child processes spawned by these common system binaries.
  • Uses stats to count occurrences and identify unusual activity by looking at the number of unique hosts and processes involved.
  • Requires additional data analysis and investigation into results to identify malicious or unauthorized use of system binaries.

MITRE ATT&CK Techniques

License

  • Elastic License v2