
Summary
This detection rule identifies instances where specific VMware processes ("vmware-vmx" or "vmx") are terminated on Linux systems using a "kill" command. By monitoring for the "end" event type, which denotes process termination, this rule highlights potential interference by threat actors trying to disrupt virtual environments. The primary query checks for Linux hosts where the relevant processes are being ended by the parent process named "kill." The detection rule has a moderate risk score of 47, indicating its importance in maintaining the integrity of virtual infrastructure. The setup requires Elastic Defend to be integrated into Elastic Agent, which is necessary for monitoring the specified events. The triage and response section provides insights into investigating potential incidents, addressing false positives, and mitigating impacts on affected virtual environments. Furthermore, it emphasizes the necessity for prompt incident response by isolating affected systems, terminating unauthorized processes, and conducting thorough forensic analysis to uncover any footprints the adversaries may have left behind.
Categories
- Endpoint
Data Sources
- Process
- Command
ATT&CK Techniques
- T1489
Created: 2023-04-11