heroui logo

Suspicious PlistBuddy Usage via OSquery

Splunk Security Content

View Source
Summary
The rule titled 'Suspicious PlistBuddy Usage via OSquery' aims to detect the use of the PlistBuddy utility on macOS systems, which is notably involved in creating or modifying property list (.plist) files. This detection mechanism utilizes OSQuery to observe process events, particularly targeting commands that interact with LaunchAgents and the 'RunAtLoad' property. This behavior becomes critical as it relates to establishing persistence on the system, a technique frequently exploited by malicious software such as Silver Sparrow. A successful detection may indicate potential unauthorized persistence mechanisms that allow attackers not only to maintain access but also to possibly elevate their privileges or execute arbitrary commands on the compromised machine. The analytical approach involves a careful examination of processes with command lines that include keywords relevant to LaunchAgents, RunAtLoad, and true values, thereby identifying suspicious usage patterns.
Categories
  • macOS
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1543.001
  • T1543
Created: 2024-11-13