heroui logo

File Execution (Unix)

Anvilogic Forge

View Source
Summary
The rule detects file execution events on Unix-based systems by monitoring command execution through a variety of sources, including the execve syscall, process titles, and bash history. It specifically looks for executed commands that are relative paths (i.e., start with './' or '/') but excludes common system directories ('/usr/bin/', '/bin/', '/sbin/', '/usr/libexec/') to focus on potentially malicious file executions that are not part of standard system operations. The logic uses regular expressions to capture the command executed and stores it alongside relevant attributes like hostname and user. The results are aggregated within a 5-minute window, filtering for instances where a command is executed on a unique host with limited occurrences to reduce noise from legitimate processes. This rule aims to identify suspicious activities related to threat actors associated with TeamTNT and the Winnti Group, particularly in scenarios akin to file-based attacks involving Unix shell scripts. It ties into the MITRE ATT&CK framework under T1059.004, focusing on Unix shell command techniques.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • Logon Session
  • File
ATT&CK Techniques
  • T1548.003
  • T1059.004
Created: 2024-02-09