
Summary
The rule "Suspicious Hidden Child Process of Launchd" is designed to detect the execution of child processes under launchd in macOS environments, particularly those that are hidden. Such processes can be indicative of adversarial activities aimed at establishing persistence via mechanisms such as launch agents, daemons, or logon items. The rule leverages data collected from Elastic Defend to identify processes that have been initiated by launchd but originate from suspicious or hidden files. The query examines system events focusing on processes starting from the launchd executable. The inclusion of detailed investigative steps underscores its utility in triaging potential threats, guiding analysts to assess the legitimacy of processes while also considering false positives due to legitimate applications using hidden files.
Categories
- macOS
- Endpoint
- Cloud
Data Sources
- Process
- Application Log
- File
ATT&CK Techniques
- T1543
- T1543.001
- T1564
- T1564.001
Created: 2020-01-07