heroui logo

Unknown Execution of Binary with RWX Memory Region

Elastic Detection Rules

View Source
Summary
The rule named "Unknown Execution of Binary with RWX Memory Region" is designed to detect unauthorized execution of unknown binaries in Linux environments that have been allocated read, write, and execute (RWX) permissions in memory. The monitoring focuses specifically on the system call `mprotect()`, which modifies memory permissions. Granting RWX access to memory pages can be indicative of malicious activities, such as code injection or exploitation by adversaries, particularly when the binary is unfamiliar. To implement this rule effectively, it is essential to use the `auditd_manager` integration, along with the appropriate audit rules that track the `mprotect` syscall for any binaries that could be executed with these excessive permissions. The risk score assigned to the detection is 47, categorized under medium severity, responding to execution-related threats. When triggering an alert, the rule excludes known safe binaries like Node.js and Apache but warns about the potential for false positives from custom applications or development environments. The investigative steps include reviewing the associated process details, command-line arguments, checking against threat databases, and analyzing network activity. Remediation steps involve isolating the affected system and conducting a forensic analysis to identify the source of compromise.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • Script
  • Network Traffic
  • Application Log
  • File
ATT&CK Techniques
  • T1059
  • T1059.004
Created: 2024-03-13