heroui logo

System Information Discovery Via Sysctl - MacOS

Sigma Rules

View Source
Summary
This detection rule targets the execution of the `sysctl` command in macOS, specifically focusing on arguments commonly associated with system information discovery tactics utilized by threat actors. The `sysctl` command is often leveraged by malware to extract sensitive system hardware details, which can help attackers ascertain whether they are operating in a virtualized environment or a security sandbox designed for analysis purposes. This rule defines a selection process that captures command lines containing `sysctl` calls aimed at querying hardware parameters (prefixed with `hw.`) and kernel parameters (prefixed with `kern.` and `machdep.`). It's essential for identifying potential evasion tactics where malware seeks to avoid detection by altering its behavior based on the environment it runs in. The detection framework is designed to flag such activities while accounting for the possibility of legitimate administrative use of the command, classifying it as a medium-level alert given the risk of misuse in the context of malware operations.
Categories
  • macOS
  • Endpoint
Data Sources
  • Process
Created: 2024-05-27