
Summary
This detection rule, authored by Elastic, aims to identify the execution of the 'strace' tool in a privileged context, which has the potential to be used maliciously for privilege escalation or lateral movement within systems. 'Strace' is a diagnostic tool commonly used for tracing system calls, and its ability to invoke a shell could allow an attacker to escape from restrictive environments, potentially leading to unauthorized privilege elevation. This rule monitors for processes starting with the name 'strace' across relevant logs, specifically targeting Linux environments. Given the dual-use nature of 'strace', there is a risk of false positives, typically originating from benign activities by developers or systems engineers engaged in debugging or routine system monitoring. The rule is designed to help differentiate between legitimate use cases and those that may represent malicious intent, offering a risk score of 21 and categorized as a low severity threat. The rule has a creation date of February 18, 2020, and has been marked as deprecated since July 28, 2022. It utilizes information from the 'auditbeat-*' and 'logs-endpoint.events.*' indices, leveraging the KQL (Kibana Query Language) for querying events categorized under process starts involving 'strace'. The coverage of this rule aligns with the MITRE ATT&CK framework, specifically targeting the tactic of Privilege Escalation through the technique ‘Exploitation for Privilege Escalation' (T1068).
Categories
- Linux
- Endpoint
Data Sources
- Process
- Application Log
ATT&CK Techniques
- T1068
Created: 2020-02-18