SigmaHQ/rules/linux/macos_startup_items.yml

25 lines
771 B
YAML
Raw Normal View History

2020-10-14 08:14:00 +00:00
title: Startup Items
id: dfe8b941-4e54-4242-b674-6b613d521962
status: experimental
description: Detects creation of startup item plist files that automatically get executed at boot initialization to establish persistence.
author: Alejandro Ortuno, oscd.community
date: 2020/10/14
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1037.005/T1037.005.md
logsource:
category: file_event
product: macos
detection:
selection_1:
2020-10-20 15:31:00 +00:00
TargetFilename|contains: '/Library/StartupItems/'
2020-10-14 08:14:00 +00:00
selection_2:
2020-10-20 15:31:00 +00:00
TargetFilename|endswith: '.plist'
2020-10-14 08:14:00 +00:00
condition: selection_1 and selection_2
falsepositives:
- Legitimate administration activities
2021-04-02 22:00:43 +00:00
level: low
2020-10-14 08:14:00 +00:00
tags:
- attack.persistence
- attack.privilege_escalation
- attack.t1037.005