heroui logo

Osacompile Execution By Potentially Suspicious Applet/Osascript

Sigma Rules

View Source
Summary
This detection rule identifies potentially suspicious activity on macOS systems involving the execution of the 'osacompile' command by a parent process associated with applets or osascript. The rule is configured to capture instances where a child process is initiated by a parent process ending with '/applet' or '/osascript', coupled with the command line containing 'osacompile'. This behavior is characteristic of potentially malicious activity, as 'osacompile' is typically used to compile AppleScript applets, and its misuse could lead to execution of unintended or harmful scripts. The rule is currently in a testing phase and targets processes related to application behavior on macOS, helping to prevent the execution of potentially harmful scripts.
Categories
  • macOS
  • Endpoint
Data Sources
  • Process
Created: 2023-04-03