Suspicious Execution via macOS Script Editor
Detects when the macOS Script Editor utility spawns an unusual child process.
Sigma rule (View on GitHub)
1title: Suspicious Execution via macOS Script Editor
2id: 6e4dcdd1-e48b-42f7-b2d8-3b413fc58cb4
3status: test
4description: Detects when the macOS Script Editor utility spawns an unusual child process.
5author: Tim Rauch (rule), Elastic (idea)
6references:
7 - https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-7f541fbc4a4a28a92970e8bf53effea5bd934604429112c920affb457f5b2685
8 - https://wojciechregula.blog/post/macos-red-teaming-initial-access-via-applescript-url/
9date: 2022-10-21
10modified: 2022-12-28
11logsource:
12 category: process_creation
13 product: macos
14tags:
15 - attack.t1566
16 - attack.t1566.002
17 - attack.initial-access
18 - attack.t1059
19 - attack.t1059.002
20 - attack.t1204
21 - attack.t1204.001
22 - attack.execution
23 - attack.persistence
24 - attack.t1553
25 - attack.defense-evasion
26detection:
27 selection_parent:
28 ParentImage|endswith: '/Script Editor'
29 selection_img:
30 - Image|endswith:
31 - '/curl'
32 - '/bash'
33 - '/sh'
34 - '/zsh'
35 - '/dash'
36 - '/fish'
37 - '/osascript'
38 - '/mktemp'
39 - '/chmod'
40 - '/php'
41 - '/nohup'
42 - '/openssl'
43 - '/plutil'
44 - '/PlistBuddy'
45 - '/xattr'
46 - '/sqlite'
47 - '/funzip'
48 - '/popen'
49 - Image|contains:
50 - 'python'
51 - 'perl'
52 condition: all of selection_*
53falsepositives:
54 - Unknown
55level: medium
References
Related rules
- HTML Help HH.EXE Suspicious Child Process
- Payload Decoded and Decrypted via Built-in Utilities
- Suspicious HH.EXE Execution
- Account Tampering - Suspicious Failed Logon Reasons
- Activity From Anonymous IP Address