osquery-defense-kit/detection/privesc/unexpected-privilege-escala...

66 lines
1.9 KiB
MySQL
Raw Normal View History

2022-10-19 20:56:32 +00:00
-- Find processes that run with a lower effective UID than their parent (event-based)
2022-10-14 18:19:13 +00:00
--
2022-10-19 20:56:32 +00:00
-- references:
-- * https://attack.mitre.org/techniques/T1548/001/ (Setuid and Setgid)
-- * https://cybersecurity.att.com/blogs/labs-research/shikitega-new-stealthy-malware-targeting-linux
--
-- related:
-- * unexpected-privilege-escalation.sql
--
-- tags: events process escalation
-- platform: posix
2022-10-14 18:19:13 +00:00
-- interval: 30
SELECT
p.pid AS child_pid,
p.path AS child_path,
REGEX_MATCH (RTRIM(file.path, '/'), '.*/(.*?)$', 1) AS child_name,
p.cmdline AS child_cmdline,
p.euid AS child_euid,
file.mode AS child_mode,
hash.sha256 AS child_hash,
p.parent AS parent_pid,
pp.path AS parent_path,
pp.name AS parent_name,
pp.cmdline AS parent_cmdline,
pp.euid AS parent_euid,
pfile.mode AS parent_mode,
hash.sha256 AS parent_hash
FROM
process_events p
JOIN processes pp ON p.parent = pp.pid
LEFT JOIN file ON p.path = file.path
LEFT JOIN hash ON p.path = hash.path
2022-10-21 21:38:29 +00:00
LEFT JOIN file AS pfile ON pp.path = pfile.path
LEFT JOIN hash AS phash ON pp.path = phash.path
WHERE
p.time > (strftime('%s', 'now') -30)
AND p.euid < pp.euid
AND p.path NOT IN (
'/bin/ps',
'/usr/bin/doas',
'/usr/bin/fusermount',
'/usr/bin/fusermount3',
'/usr/bin/login',
'/usr/bin/sudo',
'/usr/bin/top',
'/usr/lib/snapd/snap-confine',
'/usr/lib/snapd/snap-update-ns',
'/usr/lib/systemd/systemd',
'/usr/lib/Xorg.wrap'
)
AND p.path NOT LIKE '/nix/store/%/bin/sudo'
AND p.path NOT LIKE '/nix/store/%/bin/dhcpcd'
AND p.path NOT LIKE '/snap/snapd/%/usr/lib/snapd/snap-confine'
AND NOT (
child_name = 'polkit-agent-helper-1'
AND parent_path = '/usr/bin/gnome-shell'
)
AND NOT (
child_name = 'fusermount3'
AND parent_path = '/usr/lib/xdg-document-portal'
)
AND NOT (
child_name IN ('dash', 'pkexec')
AND parent_path = '/usr/bin/update-notifier'
)