
Summary
The rule titled 'Suspicious Execution via macOS Script Editor' is designed to detect potentially malicious actions on macOS systems by monitoring the process creation activities that stem from the Script Editor utility. Specifically, this rule triggers when the Script Editor spawns an unusual child process, particularly those that are not commonly associated with normal scripting activities. The key detection mechanism relies on evaluating the parent process (must be Script Editor) and then checking the nature of the child processes. The rule specifies a selection of child processes that are often associated with malicious behavior, such as shell interpreters and scripting tools (e.g. curl, bash, python, etc.). This detection helps identify potential attempts to exploit the vulnerable capabilities of the macOS environment by carrying out unauthorized execution of scripts. The selection criteria ensure that not just any spawning of a child process will trigger an alert, but only those that fit the defined suspicious characteristics, thereby reducing the likelihood of false positives while focusing on behavior indicative of attacks such as initial access and execution. Effective usage of this rule assists security teams in monitoring and investigating to maintain integrity within macOS systems.
Categories
- macOS
- Endpoint
Data Sources
- Process
Created: 2022-10-21