
Summary
This detection rule identifies suspicious behavior on macOS systems by monitoring for unexpected child processes that are spawned by the 'ScreenSaverEngine' process. Attackers may utilize the screensaver as a vector for maintaining persistence on a system by deploying a malicious .saver file that executes unauthorized commands upon screensaver activation. The rule uses Elastic’s EQL (Event Query Language) to check for process events where the parent process is identified as 'ScreenSaverEngine', specifically focusing on the start event type. The risk score associated with this rule is set to 47, indicating a medium severity level for potential threats. It is critical to analyze any child processes spawned in this context to determine whether they indicate malicious activities, such as the deployment of payloads from external sources or unauthorized command execution. Triage efforts should include reviewing the configured screensaver and any associated files to assess their legitimacy.
Categories
- macOS
- Endpoint
- Other
Data Sources
- Process
- Application Log
ATT&CK Techniques
- T1546
- T1546.002
Created: 2021-10-05