heroui logo

Launch Agent/Daemon Execution Via Launchctl

Sigma Rules

View Source
Summary
This detection rule monitors macOS for activities involving the execution of Launch Agents or Launch Daemons via the launchctl command. Launchctl is a command-line tool used to manage launch services on macOS, which includes loading and starting background services. The detection logic is set to trigger on specific behaviors when launchctl is executed, particularly checking if the image path ends with '/launchctl' and if the command line arguments include 'submit', 'load', or 'start'. This behavior is commonly associated with attempts to establish persistence or run unauthorized services on the system. False positives may occur during legitimate administration tasks, hence it is advised to investigate the context of the command line after detection. This rule aims to identify potentially malicious actions by monitoring for unusual or unsolicited use of launchctl that indicates an attacker may be attempting to maintain access or run malware on an endpoint.
Categories
  • macOS
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1569.001
Created: 2024-05-13