OSACompile Run-Only Execution
Detects potential suspicious run-only executions compiled using OSACompile
Sigma rule (View on GitHub)
1title: OSACompile Run-Only Execution
2id: b9d9b652-d8ed-4697-89a2-a1186ee680ac
3status: test
4description: Detects potential suspicious run-only executions compiled using OSACompile
5references:
6 - https://redcanary.com/blog/applescript/
7 - https://ss64.com/osx/osacompile.html
8author: Sohan G (D4rkCiph3r)
9date: 2023-01-31
10tags:
11 - attack.t1059.002
12 - attack.execution
13logsource:
14 product: macos
15 category: process_creation
16detection:
17 selection:
18 CommandLine|contains|all:
19 - 'osacompile'
20 - ' -x '
21 - ' -e '
22 condition: selection
23fields:
24 - CommandLine
25falsepositives:
26 - Unknown
27level: high
References
Related rules
- Clipboard Data Collection Via OSAScript
- JXA In-memory Execution Via OSAScript
- MacOS Scripting Interpreter AppleScript
- Osacompile Execution By Potentially Suspicious Applet/Osascript
- Suspicious Execution via macOS Script Editor