
Summary
The rule 'Suspicious CronTab Creation or Modification' is designed to detect potentially malicious attempts to create or modify crontab entries on macOS using processes other than the standard crontab utility, such as Python or osascript. This behavior can indicate that an attacker is trying to establish persistence on a compromised system by using cron jobs to schedule the execution of malicious scripts or commands. The rule utilizes EQL (Event Query Language) to scan logs from the Elastic Defend integration for events where a file within "/private/var/at/tabs/" is accessed by a process that is not the legitimate crontab executable. A risk score of 47 is assigned to this rule, indicating a medium level of risk associated with the activity it detects. The rule relies on the presence of specific data from Elastic Defend, which must be configured appropriately to capture the necessary events. The investigation guide included in the rule provides comprehensive steps for analysts to determine the legitimacy of the detected activity, manage false positives, and outline response actions to mitigate any threats posed by suspicious crontab modifications.
Categories
- Endpoint
- macOS
Data Sources
- File
- Process
- Application Log
ATT&CK Techniques
- T1053
- T1053.003
Created: 2022-04-25