
Summary
This rule is designed to detect the execution of Apple's script interpreter, 'osascript', with administrator privileges and without a password prompt. Such behavior is characteristic of potential misuse of the AppleScript scripting language, which can be used to automate tasks on macOS. The detection focuses on processes that match the specified criteria, while excluding certain benign parent processes to minimize false positives. The implementation requires that data is sourced from the Elastic Defend integration, which utilizes Elastic Agent for monitoring events on macOS systems. The query utilizes Elastic Query Language (EQL) to filter out processes based on type, name, command line, and parent process to determine if any malicious activity may be taking place involving elevated privileges. The rule is categorized under the 'Execution' and 'Privilege Escalation' tactics of the MITRE ATT&CK framework, specifically targeting techniques such as 'Valid Accounts' and 'Command and Scripting Interpreter'. This highlights the importance of recognizing unauthorized usage of scripts in order to maintain security within the macOS environment.
Categories
- Endpoint
- macOS
Data Sources
- Process
- Application Log
ATT&CK Techniques
- T1078
- T1059
Created: 2020-12-27