heroui logo

Suspicious Automator Workflows Execution

Elastic Detection Rules

View Source
Summary
The "Suspicious Automator Workflows Execution" rule identifies malicious activity on macOS that involves the execution of Automator Workflows followed by network connections from the Automator's XPC service. Attackers may leverage Automator Workflows to execute harmful JavaScript for Automation (JXA) scripts instead of using conventional scripting methods like osascript. This rule utilizes EQL (Event Query Language) to monitor the execution of the 'automator' process and queries for subsequent network activity from the 'com.apple.automator.runner' process. It focuses on detecting unusual patterns where the Automator process initiates network connections, which could indicate exploitation and the use of JXA for malicious purposes. The rule has a defined risk score of 47, categorized as medium severity, and is intended for deployment through Elastic Defend, which requires specific setup on macOS systems.
Categories
  • macOS
  • Endpoint
  • Cloud
Data Sources
  • Process
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1059
Created: 2020-12-23