148 lines
4.0 KiB
SQL
148 lines
4.0 KiB
SQL
-- Unexpected process that spawns shell processes (event-based)
|
|
--
|
|
-- false positives:
|
|
-- * IDE's
|
|
--
|
|
-- references:
|
|
-- * https://attack.mitre.org/techniques/T1059/ (Command and Scripting Interpreter)
|
|
-- * https://attack.mitre.org/techniques/T1204/002/ (User Execution: Malicious File)
|
|
--
|
|
-- tags: process events
|
|
-- interval: 300
|
|
-- platform: posix
|
|
SELECT
|
|
pe.path AS child_path,
|
|
REGEX_MATCH (pe.path, '.*/(.*)', 1) AS child_name,
|
|
TRIM(pe.cmdline) AS child_cmd,
|
|
pe.pid AS child_pid,
|
|
pe.euid AS child_euid,
|
|
p.cgroup_path AS child_cgroup,
|
|
pe.parent AS parent_pid,
|
|
TRIM(IIF(pp.cmdline != NULL, pp.cmdline, ppe.cmdline)) AS parent_cmd,
|
|
TRIM(IIF(pp.path != NULL, pp.path, ppe.path)) AS parent_path,
|
|
IIF(pp.path != NULL, phash.sha256, pehash.sha256) AS parent_hash,
|
|
REGEX_MATCH (
|
|
IIF(pp.path != NULL, pp.path, ppe.path),
|
|
'.*/(.*)',
|
|
1
|
|
) AS parent_name,
|
|
TRIM(IIF(gp.cmdline != NULL, gp.cmdline, gpe.cmdline)) AS gparent_cmd,
|
|
TRIM(IIF(gp.path != NULL, gp.path, gpe.path)) AS gparent_path,
|
|
IIF(gp.path != NULL, gphash.sha256, gpehash.path) AS gparent_hash,
|
|
REGEX_MATCH (
|
|
IIF(gp.path != NULL, gp.path, gpe.path),
|
|
'.*/(.*)',
|
|
1
|
|
) AS gparent_name,
|
|
IIF(pp.parent != NULL, pp.parent, ppe.parent) AS gparent_pid
|
|
FROM
|
|
process_events pe
|
|
LEFT JOIN processes p ON pe.pid = p.pid
|
|
LEFT JOIN processes pp ON pe.parent = pp.pid
|
|
LEFT JOIN hash phash ON pp.path = phash.path
|
|
LEFT JOIN process_events ppe ON pe.parent = ppe.pid
|
|
LEFT JOIN hash pehash ON ppe.path = pehash.path
|
|
LEFT JOIN processes gp ON gp.pid = pp.parent
|
|
LEFT JOIN hash gphash ON gp.path = gphash.path
|
|
LEFT JOIN process_events gpe ON ppe.parent = gpe.pid
|
|
LEFT JOIN hash gpehash ON gpe.path = gpehash.path
|
|
WHERE
|
|
child_name IN ('sh', 'fish', 'zsh', 'bash', 'dash')
|
|
AND pe.time > (strftime('%s', 'now') -300) -- Ignore partial table joins
|
|
AND NOT (
|
|
parent_name IN (
|
|
'abrt-handle-eve',
|
|
'alacritty',
|
|
'bash',
|
|
'build-script-build',
|
|
'chezmoi',
|
|
'gke-gcloud-auth-plugin',
|
|
'clang-11',
|
|
'gdm-session-worker',
|
|
'code',
|
|
'Code Helper (Renderer)',
|
|
'Code - Insiders Helper (Renderer)',
|
|
'collect2',
|
|
'conmon',
|
|
'containerd-shim',
|
|
'dash',
|
|
'demoit',
|
|
'direnv',
|
|
'doas',
|
|
'docker-credential-desktop',
|
|
'env',
|
|
'erl_child_setup',
|
|
'chainctl',
|
|
'find',
|
|
'docker-credential-gcr',
|
|
'FinderSyncExtension',
|
|
'fish',
|
|
'git',
|
|
'go',
|
|
'goland',
|
|
'helm',
|
|
'i3bar',
|
|
'i3blocks',
|
|
'java',
|
|
'kitty',
|
|
'ko',
|
|
'kubectl',
|
|
'lightdm',
|
|
'login',
|
|
'make',
|
|
'monorail',
|
|
'ninja',
|
|
'nix',
|
|
'nix-build',
|
|
'nix-daemon',
|
|
'node',
|
|
'nvim',
|
|
'package_script_service',
|
|
'perl',
|
|
-- 'python' - do not include this, or you won't detect supply-chain attacks.
|
|
'PK-Backend',
|
|
'roxterm',
|
|
'sdk',
|
|
'sdzoomplugin',
|
|
'sh',
|
|
'skhd',
|
|
'snyk',
|
|
'sshd',
|
|
'sudo',
|
|
'swift',
|
|
'systemd',
|
|
'systemd-sleep',
|
|
'terminator',
|
|
'test2json',
|
|
'tmux',
|
|
'tmux:server',
|
|
'vi',
|
|
'vim',
|
|
'watch',
|
|
'wezterm-gui',
|
|
'xargs',
|
|
'xcrun',
|
|
'xfce4-terminal',
|
|
'yum',
|
|
'zellij',
|
|
'zsh'
|
|
)
|
|
OR parent_name LIKE 'terraform-provider-%'
|
|
-- Do not add shells to this list if you want your query to detect
|
|
-- bad programs that were started from a shell.
|
|
OR gparent_name IN ('env', 'git')
|
|
-- Homebrew, except we don't want to allow all of ruby
|
|
OR child_cmd IN (
|
|
'sh -c /bin/stty size 2>/dev/null',
|
|
'sh -c python3.7 --version 2>&1',
|
|
'sh -c xcode-select --print-path >/dev/null 2>&1 && xcrun --sdk macosx --show-sdk-path 2>/dev/null'
|
|
)
|
|
OR child_cmd LIKE '/bin/bash /usr/local/Homebrew/Library%'
|
|
OR child_cmd LIKE '/bin/sh %google-cloud-sdk/bin/docker-credential-gcloud get'
|
|
OR child_cmd LIKE '%/bash -e%/bin/as -arch%'
|
|
OR gparent_cmd LIKE '/bin/bash /usr/local/bin/brew%'
|
|
OR gparent_cmd LIKE '/usr/bin/python3 -m py_compile %'
|
|
)
|
|
GROUP BY
|
|
pe.pid
|