
Summary
The rule titled 'Executable Masquerading as Kernel Process' is designed to detect abnormalities in Linux kernel processes caused by malicious actors attempting to disguise their harmful applications. Legitimate kernel processes like 'kthreadd' and 'kworker' usually do not contain executable file paths. However, attackers may employ these names for their malicious processes, thereby evading standard detection mechanisms. This rule monitors Linux events to identify when a process resembling these kernel processes has a non-empty 'process.executable' field, signaling potential masquerading. The detection utilizes conditions based on the process name and associated executable information, making it crucial for identifying stealthy threats. With a risk score of 21, it is categorized as low severity, indicating the need for further analysis upon detection. Additionally, the rule is applicable for environments utilizing Elastic Defend and has integration support for various security tools such as CrowdStrike and SentinelOne.
Categories
- Endpoint
Data Sources
- Process
- File
ATT&CK Techniques
- T1036
- T1036.004
- T1564
Created: 2024-02-01