
Summary
The rule titled "Unusual Preload Environment Variable Process Execution" is designed to detect potential malicious activity in Linux environments by identifying processes that utilize uncommon environment variables during execution. Attackers may exploit environment variables such as LD_PRELOAD and LD_LIBRARY_PATH to inject malicious libraries into a process's memory space, allowing for system compromise and execution hijacking. The detection leverages Elastic Defend integration within the Elastic Agent to monitor process events and can specifically capture environment variable changes through advanced settings in the integration policy. False positives are a concern in development environments due to legitimate use of preload variables, requiring careful analysis and possible whitelisting of known variables. A thorough investigation following an alert may include reviewing process details, understanding the parent process, analyzing the variable content, and examining the surrounding system logs for corroborating evidence.
Categories
- Endpoint
- Linux
Data Sources
- Process
- Application Log
- Script
ATT&CK Techniques
- T1574
- T1574.006
Created: 2024-12-16