osquery-defense-kit/detection/evasion/executables-from-the-future...

49 lines
1.3 KiB
SQL

-- Programs which claim to be from the future, based on (btime,ctime,mtime)
--
-- references:
-- * https://attack.mitre.org/techniques/T1070/006/ (Indicator Removal on Host: Timestomp)
--
-- false positives:
-- * Badly distributed software
--
-- tags: persistent state process
SELECT
p.pid,
p.path,
p.name,
p.cmdline,
p.cwd,
p.euid,
p.parent,
f.ctime,
f.btime,
f.mtime,
p.start_time,
f.mtime > (strftime('%s', 'now') + 43200) AS mtime_newer,
f.ctime > (strftime('%s', 'now') + 43200) AS ctime_newer,
f.btime > (strftime('%s', 'now') + 43200) AS btime_newer,
f.mtime - strftime('%s', 'now') AS mtime_diff,
f.ctime - strftime('%s', 'now') AS ctime_diff,
f.btime - strftime('%s', 'now') AS btime_diff,
strftime('%s', 'now') AS now_ts,
hash.sha256 AS child_hash256,
pp.path AS parent_path,
pp.cmdline AS parent_cmd,
pp.cwd AS parent_cwd,
hash.sha256 AS parent_sha256
FROM
processes p
LEFT JOIN file f ON p.path = f.path
LEFT JOIN processes pp ON p.parent = pp.pid
LEFT JOIN hash ON p.path = hash.path
WHERE
(
mtime_newer == 1
OR ctime_newer == 1
OR btime_newer == 1
)
AND NOT p.path LIKE '/Applications/Signal.app%'
AND NOT p.path LIKE '/private/var/db/com.apple.xpc.roleaccountd.staging/%'
-- 2038
AND NOT f.mtime > 2153484373