osquery-defense-kit/detection/execution/sketchy-fetcher-events.sql

100 lines
3.1 KiB
SQL

-- Suspicious URL requests by built-in fetching tools (event-based)
--
-- refs:
-- * https://attack.mitre.org/techniques/T1105/ (Ingress Tool Transfer)
-- * https://attack.mitre.org/techniques/T1571/ (Non-Standard Port)
--
-- interval: 60
-- tags: transient process events
-- platform: posix
SELECT
p.pid,
p.path,
p.cmdline,
REGEX_MATCH (p.cmdline, '/(\d+\.\d+\.\d+\.\d+)[:/]', 1) AS remote_address,
REGEX_MATCH (p.cmdline, '/(:\d+\/)/', 1) AS remote_port,
p.mode,
p.cwd,
p.euid,
p.parent,
p.syscall,
pp.path AS parent_path,
pp.name AS parent_name,
pp.cmdline AS parent_cmdline,
pp.euid AS parent_euid,
hash.sha256 AS parent_sha256
FROM
process_events p
LEFT JOIN processes pp ON p.parent = pp.pid
LEFT JOIN hash ON pp.path = hash.path
WHERE
p.time > (strftime('%s', 'now') -60)
-- NOTE: Sync remaining portion with sketchy-fetchers
AND (
INSTR(p.cmdline, 'wget ') > 0
OR INSTR(p.cmdline, 'curl ') > 0
)
AND (
-- If it's an IP or port, it's suspicious
remote_address NOT IN ('', '127.0.0.1', '::1')
OR remote_port != ''
-- Or if it matches weird keywords we've seen
OR p.cmdline LIKE '%.onion%'
OR p.cmdline LIKE '%tor2web%'
OR p.cmdline LIKE '%aliyun%'
OR p.cmdline LIKE '%pastebin%'
OR p.cmdline LIKE '%curl.*—write-out%'
OR p.cmdline LIKE '%curl %--user-agent%'
OR p.cmdline LIKE '%curl -k%'
OR p.cmdline LIKE '%curl -sL %'
OR p.cmdline LIKE '%curl%--connect-timeout%'
OR p.cmdline LIKE '%curl%--output /dev/null%'
OR p.cmdline LIKE '%curl%--O /dev/null%'
OR p.cmdline LIKE '%curl%--insecure%'
OR p.cmdline LIKE '%wget %--user-agent%'
OR p.cmdline LIKE '%wget %--no-check-certificate%'
OR p.cmdline LIKE '%wget -nc%'
OR p.cmdline LIKE '%wget -t%'
-- Or anything launched by a system user
OR (
p.cmdline LIKE '%wget -%'
AND p.euid < 500
)
OR (
p.cmdline LIKE '%curl %'
AND p.euid < 500
AND p.cmdline NOT LIKE "%./configure %--with-curl%"
)
)
-- Exceptions for all calls
AND pp.name NOT IN ('makepkg', 'apko') -- Exceptions for non-privileged calls
AND NOT (
p.euid > 500
AND (
p.cmdline LIKE '%--dump-header%'
OR p.cmdline LIKE '%127.0.0.1:%'
OR p.cmdline LIKE '%/192.168.%:%'
OR p.cmdline LIKE '%/api/v%'
OR p.cmdline LIKE '%application/json%'
OR p.cmdline LIKE '%/chainctl_%'
OR p.cmdline LIKE '%ctlog%'
OR p.cmdline LIKE '%curl -X %'
OR p.cmdline LIKE 'git %'
OR p.cmdline LIKE '%go mod %'
OR p.cmdline LIKE '%grpcurl%'
OR p.cmdline LIKE '%Homebrew%'
OR p.cmdline LIKE '%https://api.github.com/%'
OR p.cmdline LIKE '%If-None-Match%'
OR p.cmdline LIKE "%libcurl%"
OR p.cmdline LIKE '%LICENSES/vendor/%'
OR p.cmdline LIKE '%localhost:%'
OR p.cmdline LIKE '%/openid/v1/jwks%'
OR p.cmdline LIKE '%--progress-bar%'
OR p.cmdline LIKE '%.well-known/openid-configuration%'
OR p.cmdline LIKE 'wget --no-check-certificate https://github.com/'
OR p.cmdline LIKE 'curl -sL wttr.in%'
OR parent_cmdline LIKE '%brew.rb%'
OR parent_cmdline LIKE '%brew.sh%'
)
)