
Summary
This rule is designed to detect the usage of the "touch" process when creating or modifying service files on Linux systems. The rule specifically triggers when the process image ends with '/touch' and the command line execution includes a timestamp revision indicated by the '-t' option, along with a file name that ends with '.service'. The rationale behind this detection is to identify potential defense evasion techniques where malicious actors may attempt to manipulate service files covertly. Such file modifications can be indicative of attempts to create persistence mechanisms or hide malicious activities. Therefore, while the use of 'touch' is not inherently malicious, its application in this context should be carefully monitored for suspicious behavior.
Categories
- Linux
- Endpoint
Data Sources
- Process
Created: 2023-01-11