
Summary
This detection rule identifies instances where a systemd service is started by an unusual parent process on Linux systems. Systemd services, managed through the systemctl binary, are a common attack vector for persistence mechanisms employed by malicious actors. By monitoring attempts to start, enable, or reenable systemd services, this rule can help detect unauthorized activities that may indicate a compromise. The rule utilizes multiple Osquery queries to further investigate the context of the service execution, gathering file information, user account details, running processes, and open sockets to provide a comprehensive view of the potential incident. The detection logic is focused on filtering out benign executions associated with known parent processes while flagging atypical behaviors that could suggest malicious intent.
Categories
- Linux
- Endpoint
Data Sources
- Process
- File
- User Account
- Application Log
ATT&CK Techniques
- T1543
- T1543.002
Created: 2024-05-17