heroui logo

Launch Agent Creation or Modification and Immediate Loading

Elastic Detection Rules

View Source
Summary
This detection rule identifies the creation or modification of Launch Agents on macOS systems, which can be exploited by adversaries to maintain persistence. Launch Agents allow for scheduled execution of applications or scripts upon user login. The rule is designed to monitor any alterations to Launch Agent files in typical system directories, and it checks for the immediate use of 'launchctl' to load the modified plist files. The EQL query operates by tracking file events and corresponding process executions, ensuring that any agent modification is subsequently loaded into the system. The focus is on changes to Launch Agent directories, specifically the `/System/Library/LaunchAgents`, `/Library/LaunchAgents`, and user-specific Launch Agents. A moderate risk score (21) indicates the importance of tracking this potential persistence mechanism. It is crucial for security teams to investigate further in case of such detections, as they might indicate malicious activities that could lead to extended unauthorized access to the system.
Categories
  • Endpoint
  • macOS
Data Sources
  • File
  • Process
ATT&CK Techniques
  • T1543
  • T1543.001
Created: 2020-12-07