Suspicious Child Process of Adobe Acrobat Reader Update Service
Detects attempts to exploit privilege escalation vulnerabilities related to the Adobe Acrobat Reader PrivilegedHelperTool responsible for installing updates. For more information, refer to CVE-2020-9615, CVE-2020-9614 and CVE-2020-9613 and verify that the impacted system is patched.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2021/01/19"
3integration = ["endpoint"]
4maturity = "production"
5min_stack_comments = "New fields added: required_fields, related_integrations, setup"
6min_stack_version = "8.3.0"
7updated_date = "2023/06/22"
8
9[rule]
10author = ["Elastic"]
11description = """
12Detects attempts to exploit privilege escalation vulnerabilities related to the Adobe Acrobat Reader
13PrivilegedHelperTool responsible for installing updates. For more information, refer to CVE-2020-9615, CVE-2020-9614 and
14CVE-2020-9613 and verify that the impacted system is patched.
15"""
16false_positives = ["Trusted system or Adobe Acrobat Related processes."]
17from = "now-9m"
18index = ["auditbeat-*", "logs-endpoint.events.*"]
19language = "kuery"
20license = "Elastic License v2"
21name = "Suspicious Child Process of Adobe Acrobat Reader Update Service"
22references = [
23 "https://rekken.github.io/2020/05/14/Security-Flaws-in-Adobe-Acrobat-Reader-Allow-Malicious-Program-to-Gain-Root-on-macOS-Silently/",
24]
25risk_score = 73
26rule_id = "f85ce03f-d8a8-4c83-acdc-5c8cd0592be7"
27severity = "high"
28tags = [
29 "Domain: Endpoint",
30 "OS: macOS",
31 "Use Case: Threat Detection",
32 "Tactic: Privilege Escalation",
33 "Use Case: Vulnerability",
34 "Data Source: Elastic Defend"
35]
36timestamp_override = "event.ingested"
37type = "query"
38
39query = '''
40event.category:process and host.os.type:macos and event.type:(start or process_started) and
41 process.parent.name:com.adobe.ARMDC.SMJobBlessHelper and
42 user.name:root and
43 not process.executable: (/Library/PrivilegedHelperTools/com.adobe.ARMDC.SMJobBlessHelper or
44 /usr/bin/codesign or
45 /private/var/folders/zz/*/T/download/ARMDCHammer or
46 /usr/sbin/pkgutil or
47 /usr/bin/shasum or
48 /usr/bin/perl* or
49 /usr/sbin/spctl or
50 /usr/sbin/installer or
51 /usr/bin/csrutil)
52'''
53
54
55[[rule.threat]]
56framework = "MITRE ATT&CK"
57[[rule.threat.technique]]
58id = "T1068"
59name = "Exploitation for Privilege Escalation"
60reference = "https://attack.mitre.org/techniques/T1068/"
61
62
63[rule.threat.tactic]
64id = "TA0004"
65name = "Privilege Escalation"
66reference = "https://attack.mitre.org/tactics/TA0004/"
References
Related rules
- Sudo Heap-Based Buffer Overflow Attempt
- Apple Scripting Execution with Administrator Privileges
- Execution with Explicit Credentials via Scripting
- Potential Admin Group Account Addition
- Potential JAVA/JNDI Exploitation Attempt