
Summary
This detection rule monitors the creation or modification of launch daemons in macOS systems, which can be exploited by adversaries to maintain persistence by repeatedly executing malicious payloads. By analyzing event data, the rule identifies sequences of file changes combined with subsequent loading actions through the `launchctl` command, thereby flagging potentially malicious activity. The detection employs an EQL query to look for newly created or altered files within standard LaunchDaemon directories, followed by checks for immediate execution attempts. The simplicity of the verification enables rapid identification of potential security incidents involving persistence mechanisms, allowing for timely incident response. This rule highlights the importance of scrutinizing system-level processes that should ideally manage launch daemons, especially in environments where macOS systems are prevalent, ensuring security teams can act decisively against attempts to introduce malicious software for persistence.
Categories
- Endpoint
- macOS
Data Sources
- File
- Process
ATT&CK Techniques
- T1543
Created: 2020-12-07