heroui logo

Suspicious which Enumeration

Elastic Detection Rules

View Source
Summary
This Elastic rule monitors for potentially malicious usage of the `which` command in Linux environments, specifically when it is executed with an unusual number of arguments (10 or more). Attackers may utilize the `which` command to discover paths to installed executables that can be exploited for privilege escalation or lateral movement within a network after gaining initial access. The rule filters out benign instances by excluding well-known parent processes, path prefixes indicative of containerized environments, and specific benign command-line arguments. EQL (Event Query Language) is employed to define the detection logic, assessing attributes such as the process's parent-child relationships and the overall context of the detected events.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • Logon Session
  • File
  • Network Traffic
ATT&CK Techniques
  • T1082
Created: 2023-08-30