osquery-defense-kit/detection/initial_access/unexpected-volume-contents.sql

101 lines
2.5 KiB
MySQL
Raw Normal View History

-- Scan removable volumes for sketchy files
--
2022-10-14 18:19:13 +00:00
-- false positives:
-- * Installer packages with hidden files
--
2022-10-14 18:19:13 +00:00
-- references:
2022-10-19 20:56:32 +00:00
-- * https://attack.mitre.org/techniques/T1566/001/ (Phishing: Spearphishing Attachment)
-- * https://attack.mitre.org/techniques/T1204/002/ (User Execution: Malicious File)
2022-10-14 18:19:13 +00:00
-- * https://www.crowdstrike.com/blog/how-crowdstrike-uncovered-a-new-macos-browser-hijacking-campaign/
--
-- tags: transient volume filesystem
-- platform: darwin
SELECT
RTRIM(file.path, '/') AS trimpath,
uid,
filename,
gid,
mode,
REGEX_MATCH (file.path, '(.*)/', 1) AS dirname,
REGEX_MATCH (RTRIM(file.path, '/'), '.*/(.*?)$', 1) AS basename,
REGEX_MATCH (RTRIM(file.path, '/'), '.*\.(.*?)$', 1) AS extension,
mtime,
ctime,
symlink,
type,
size,
hash.sha256,
magic.data,
signature.identifier,
signature.authority
FROM
file
LEFT JOIN hash on file.path = hash.path
LEFT JOIN magic ON file.path = magic.path
LEFT JOIN signature ON file.path = signature.path
WHERE
(
file.path LIKE '/Volumes/%/%'
OR file.path LIKE '/Volumes/%/.%'
)
AND file.path NOT LIKE '/Volumes/Macintosh HD%'
AND file.path NOT LIKE '/Volumes/%/.com.apple.timemachine%'
AND (
extension IN (
'command',
'lnk',
'mpkg',
-- Enable later once we know this query works well
-- 'pkg',
'scpt',
'dmg',
'iso',
'gz',
'sh',
'sql'
)
OR file.symlink != 0
OR basename LIKE '.%'
OR basename LIKE '%.sql%'
OR basename LIKE '%Chrome%'
OR basename LIKE '%Extension%'
OR basename LIKE '%enforce%'
OR basename LIKE '%hidden%'
OR basename LIKE '%Installer%'
OR basename LIKE '%mono%'
OR basename LIKE '%secret%'
OR basename LIKE '%sql%'
OR basename LIKE '%guard%'
OR basename LIKE 'cg%'
) -- exceptions go here
AND basename NOT IN (
'..',
'.',
'.background',
'.disk_label_2x',
'.disk_label',
'.DS_Store',
'.iotest',
'.file-revisions-by-id',
'.file',
'.metadata_never_index_unless_rootfs',
'.shortcut-targets-by-id',
'.TemporaryItems',
'.Trashes',
'._Id.txt',
'.vol',
'.apdisk',
'._.Trashes',
'._.TemporaryItems',
'._.apdisk',
'.VolumeIcon.icns'
)
AND authority NOT IN (
'Developer ID Application: Google LLC (EQHXZ8M8AV)'
) -- Unsigned programs here
AND trimpath NOT IN (
'/Volumes/Google Chrome/.keystone_install',
'/Volumes/Google Chrome Canary/.keystone_install',
'/Volumes/Jabra Direct Setup/JabraDirectSetup.pkg'
)