
Summary
This Elastic rule monitors for potentially malicious usage of the `which` command in Linux environments, specifically when it is executed with an unusual number of arguments (10 or more). Attackers may utilize the `which` command to discover paths to installed executables that can be exploited for privilege escalation or lateral movement within a network after gaining initial access. The rule filters out benign instances by excluding well-known parent processes, path prefixes indicative of containerized environments, and specific benign command-line arguments. EQL (Event Query Language) is employed to define the detection logic, assessing attributes such as the process's parent-child relationships and the overall context of the detected events.
Categories
- Endpoint
- Linux
Data Sources
- Process
- Logon Session
- File
- Network Traffic
ATT&CK Techniques
- T1082
Created: 2023-08-30