heroui logo

Suspicious Path Invocation from Command Line

Elastic Detection Rules

View Source
Summary
The 'Suspicious Path Invocation from Command Line' detection rule, authored by Elastic, monitors for unusual execution patterns in Linux shell processes that utilize the PATH environment variable in command line invocations. It specifically looks for instances where the PATH variable is set in commands executed by common shell interpreters like bash or zsh, which could indicate an attempt by adversaries to execute commands from non-standard locations, thereby evading detection mechanisms. The rule is designed to identify malicious behavior such as running scripts from unusual directories, which can signify unauthorized actions on a system. Effective implementation requires integration with Elastic Defend and utilizes specific process event data indexed from Elastic environments. The rule includes a detailed setup guide for integration, as well as triage, analysis, false-positive considerations, and response remediation steps to bolster defensive measures against potential command and scripting interpretation attacks as outlined in the MITRE ATT&CK framework.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • Script
ATT&CK Techniques
  • T1059
  • T1059.004
  • T1564
Created: 2023-06-14