heroui logo

Shared Object Created or Changed by Previously Unknown Process

Elastic Detection Rules

View Source
Summary
The detection rule monitors the creation of shared object files on Linux systems by previously unknown processes. Shared object files, typically with a ".so" extension, are dynamically linked libraries compiled from code that can be loaded by programs at runtime. While their primary use is legitimate, they can also be exploited by attackers to execute unauthorized code, thus leading to security breaches. The rule focuses on events indicating shared object files are created or renamed in directories like "/dev/shm/" or "/usr/lib/", filtering out common known processes to reduce false positives. The associated Osquery queries facilitate deeper investigations into file metadata, running processes, and user activities, enhancing the capacity to detect and respond to potential threats effectively. Analysts should assess the context and investigate any related activities thoroughly to ascertain the legitimacy of the operations.
Categories
  • Endpoint
  • Linux
Data Sources
  • File
  • Process
  • User Account
ATT&CK Techniques
  • T1574
  • T1574.006
Created: 2023-06-09