
Summary
This detection rule targets the identification of processes that are backgrounded by unusual parent processes within Linux environments. Such behavior may be an indicator of a process trying to evade detection by obscuring its lineage. The rule leverages logs from various sources, such as Elastic Defend, CrowdStrike, and SentinelOne, to analyze process behavior. Specifically, it detects command executions executed with a non-standard parent process that includes the '&' operator, which signifies backgrounding. The rule employs an approach using KQL to filter specific events that signify potential evasion operations and requires integrations with Elastic security tools for effective operation. Triage and analysis recommendations are provided to investigate flagged events, including reviewing command lines and user behavior, correlating with other logs, and consulting threat intelligence sources. The detection is outlined as low severity but is critical in pinpointing potentially malicious activity that seeks to bypass security mechanisms. False positives are addressed by suggesting methods to identify benign administrative actions that might unintentionally trigger the rule.
Categories
- Endpoint
- Linux
- Cloud
- Infrastructure
Data Sources
- Process
- Container
- Application Log
- Network Traffic
ATT&CK Techniques
- T1059
- T1564
Created: 2025-01-29