Persistence Via Cron Files
Detects creation of cron file or files in Cron directories which could indicates potential persistence.
Sigma rule (View on GitHub)
1title: Persistence Via Cron Files
2id: 6c4e2f43-d94d-4ead-b64d-97e53fa2bd05
3status: test
4description: Detects creation of cron file or files in Cron directories which could indicates potential persistence.
5references:
6 - https://github.com/microsoft/MSTIC-Sysmon/blob/f1477c0512b0747c1455283069c21faec758e29d/linux/configs/attack-based/persistence/T1053.003_Cron_Activity.xml
7author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research), MSTIC
8date: 2021-10-15
9modified: 2022-12-31
10tags:
11 - attack.privilege-escalation
12 - attack.execution
13 - attack.persistence
14 - attack.t1053.003
15logsource:
16 product: linux
17 category: file_event
18detection:
19 selection1:
20 TargetFilename|startswith:
21 - '/etc/cron.d/'
22 - '/etc/cron.daily/'
23 - '/etc/cron.hourly/'
24 - '/etc/cron.monthly/'
25 - '/etc/cron.weekly/'
26 - '/var/spool/cron/crontabs/'
27 selection2:
28 TargetFilename|contains:
29 - '/etc/cron.allow'
30 - '/etc/cron.deny'
31 - '/etc/crontab'
32 condition: 1 of selection*
33falsepositives:
34 - Any legitimate cron file.
35level: medium
References
Related rules
- Modifying Crontab
- Persistence Via Sudoers Files
- Triple Cross eBPF Rootkit Default Persistence
- Azure Kubernetes CronJob
- Scheduled Cron Task/Job - Linux