
Summary
The rule titled "Potential Persistence via Cron Job" is designed to detect the creation or execution of cron jobs, which adversaries may exploit for scheduling the initial or recurring execution of malicious code. The rule analyzes events categorized as process-related activities within specific indices that include 'auditbeat-*' and 'logs-endpoint.events.*'. It utilizes a query language known as KQL (Kibana Query Language) to filter for relevant process events that are not initiated by the root user and which involved the execution of crontab commands outside of legitimate options, or spawned by the cron parent process under suspicious conditions. The main intention of this rule is to identify potential attempts at persistence through scheduled tasks in both Linux and macOS environments. Noteworthy references include instructions on cron from SS64 and a related article from F-Secure, which illustrate methods of cron job management and recognition of potential abuse. The rule is classified as low severity with a risk score of 21, indicative of potential caution required but not an immediate threat. Currently marked as deprecated, this rule has a timeline of usefulness extending until April 2021 before being phased out, hence it should not be counted on for current diagnostics.
Categories
- Linux
- macOS
- Endpoint
- Other
Data Sources
- Process
- Logon Session
- Application Log
ATT&CK Techniques
- T1053
- T1053.003
Created: 2021-01-15