System Information Discovery Using Ioreg
Detects the use of "ioreg" which will show I/O Kit registry information. This process is used for system information discovery. It has been observed in-the-wild by calling this process directly or using bash and grep to look for specific strings.
Sigma rule (View on GitHub)
1title: System Information Discovery Using Ioreg
2id: 2d5e7a8b-f484-4a24-945d-7f0efd52eab0
3status: test
4description: |
5 Detects the use of "ioreg" which will show I/O Kit registry information.
6 This process is used for system information discovery.
7 It has been observed in-the-wild by calling this process directly or using bash and grep to look for specific strings.
8references:
9 - https://www.virustotal.com/gui/file/0373d78db6c3c0f6f6dcc409821bf89e1ad8c165d6f95c5c80ecdce2219627d7/behavior
10 - https://www.virustotal.com/gui/file/4ffdc72d1ff1ee8228e31691020fc275afd1baee5a985403a71ca8c7bd36e2e4/behavior
11 - https://www.virustotal.com/gui/file/5907d59ec1303cfb5c0a0f4aaca3efc0830707d86c732ba6b9e842b5730b95dc/behavior
12 - https://www.trendmicro.com/en_ph/research/20/k/new-macos-backdoor-connected-to-oceanlotus-surfaces.html
13author: Joseliyo Sanchez, @Joseliyo_Jstnk
14date: 2023-12-20
15modified: 2024-01-02
16tags:
17 - attack.discovery
18 - attack.t1082
19logsource:
20 product: macos
21 category: process_creation
22detection:
23 # Examples:
24 # /bin/bash /bin/sh -c ioreg -l | grep -e 'VirtualBox' -e 'Oracle' -e 'VMware' -e 'Parallels' | wc -l
25 # /usr/sbin/ioreg ioreg -rd1 -w0 -c AppleAHCIDiskDriver
26 # /bin/bash /bin/sh -c ioreg -l | grep -e 'USB Vendor Name'
27 # ioreg -rd1 -c IOPlatformExpertDevice | awk '/IOPlatformSerialNumber/ { split($0, line, \"\\\"\"); printf(\"%s\", line[4]); }
28 selection_img:
29 - Image|endswith: '/ioreg'
30 - CommandLine|contains: 'ioreg'
31 selection_cmd1:
32 CommandLine|contains:
33 - '-l'
34 - '-c'
35 selection_cmd2:
36 CommandLine|contains:
37 - 'AppleAHCIDiskDriver'
38 - 'IOPlatformExpertDevice'
39 - 'Oracle'
40 - 'Parallels'
41 - 'USB Vendor Name'
42 - 'VirtualBox'
43 - 'VMware'
44 condition: all of selection_*
45falsepositives:
46 - Legitimate administrative activities
47level: medium
References
Related rules
- System Information Discovery Using System_Profiler
- System Information Discovery Using sw_vers
- Uncommon System Information Discovery Via Wmic.EXE
- HackTool - WinPwn Execution
- HackTool - WinPwn Execution - ScriptBlock