
Summary
This detection rule aims to identify potential adversarial activities involving the access and modification of common package configuration files. Adversaries might leverage system mechanisms to establish persistence or escalate privileges by using various text editors or commands to interact with sensitive configuration files such as 'requirements.txt', 'pip.conf', 'package.json', '.gemspec', and 'gemrc'. The rule utilizes Splunk to analyze endpoint data, specifically monitoring event code 4104, which indicates PowerShell script block logging. The rule captures various command-line actions that involve editing or viewing package configuration files, allowing for the identification of possible lateral movement or persistence strategies through the alteration of package management settings. The regex filter within the rule targets specific commands and files, ensuring focused detection of potentially malicious activities. By aggregating event data by time and host, the rule provides visibility into abnormal usage patterns that may indicate exploitation and misuse of system package management frameworks.
Categories
- Endpoint
- Linux
- Windows
- macOS
Data Sources
- Process
- File
- Script
- Application Log
ATT&CK Techniques
- T1546
Created: 2024-02-09