heroui logo

Suspicious Emond Child Process

Elastic Detection Rules

View Source
Summary
This detection rule identifies suspicious child processes spawned by the Event Monitor Daemon (emond) on macOS systems. Adversaries often manipulate emond by writing rules that execute commands upon specific events such as system startup or user login, thereby achieving persistence on the system. The rule is set up to monitor for specific process names typically associated with command shells and scripting environments, indicating potential abuse of the emond functionality. When triggered, the rule generates alerts that allow analysts to investigate potential malicious activity related to command execution spawned by emond, which may signify an attempt to maintain unauthorized access or execute harmful scripts.
Categories
  • Endpoint
  • macOS
Data Sources
  • Process
  • Application Log
  • File
ATT&CK Techniques
  • T1546
  • T1546.014
Created: 2021-01-11