
Suspicious System Commands Executed by Previously Unknown Executable
Elastic Detection Rules
View SourceSummary
This detection rule, authored by Elastic, is designed to monitor the execution of system commands from previously unknown executables residing in commonly exploited directories on Linux systems. The rule is set to alert when it detects such activity, which may indicate malicious actions, such as attempts to run unauthorized processes. The rule utilizes a query that checks whether the operating system is Linux, identifies process events related to execution or forking actions, and links them to executables located in specific directories that are often targeted by attackers, while ensuring that known, safe processes are excluded from alerts. Its operational framework incorporates the Elastic Defend integration via Elastic Fleet, enabling comprehensive endpoint monitoring. A risk score of 21 is assigned to this behavior, indicating a low level of risk but emphasizing the need for thorough investigation into potentially malicious activity. Triage processes are recommended for further analysis of the commands executed by unknown processes along with parent-child process relationships, user privileges associated with these actions, and pertinent logging.
Categories
- Endpoint
- Linux
Data Sources
- Process
- Container
- Application Log
ATT&CK Techniques
- T1059
- T1059.004
Created: 2023-06-14