osquery-defense-kit/detection/privesc/unexpected-setxid-process.sql
2023-06-30 16:38:31 -04:00

60 lines
1.8 KiB
SQL

-- Processes running that originate from setuid/setgid programs
--
-- false-positives:
-- * an unlisted setuid binary
--
-- references:
-- * https://attack.mitre.org/techniques/T1548/001/ (Setuid and Setgid)
--
-- tags: persistent state process escalation
-- platform: posix
SELECT
p.pid,
p.name,
p.path,
p.cmdline,
f.ctime,
p.cwd,
p.uid,
f.mode,
hash.sha256
FROM
processes p
JOIN file f ON p.path = f.path
JOIN hash ON p.path = hash.path
WHERE
f.mode NOT LIKE '0%'
AND f.path NOT IN (
'/Applications/Parallels Desktop.app/Contents/MacOS/Parallels Service',
'/Applications/VMware Fusion.app/Contents/Library/vmware-vmx',
'/bin/ps',
'/Library/Application Support/org.pqrs/Karabiner-Elements/bin/karabiner_session_monitor',
'/Library/DropboxHelperTools/Dropbox_u501/dbkextd',
'/opt/1Password/1Password-BrowserSupport',
'/opt/1Password/1Password-KeyringHelper',
'/opt/google/chrome/chrome-sandbox',
'/System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/MacOS/ARDAgent',
'/usr/bin/doas',
'/usr/bin/fusermount',
'/usr/bin/fusermount3',
'/usr/bin/keybase-redirector',
'/usr/bin/login',
'/usr/bin/mount',
'/usr/bin/op',
'/opt/zoom/cef/chrome-sandbox',
'/usr/bin/ssh-agent',
'/usr/bin/su',
'/usr/bin/sudo',
'/usr/bin/top',
'/usr/lib/electron22/chrome-sandbox',
'/usr/lib/electron/chrome-sandbox',
'/usr/lib/polkit-1/polkit-agent-helper-1',
'/usr/lib/slack/chrome-sandbox',
'/usr/lib/xf86-video-intel-backlight-helper',
'/usr/lib/Xorg.wrap',
'/usr/sbin/traceroute'
)
AND f.path NOT LIKE '/Users/%/homebrew/Cellar/socket_vmnet/%/bin/socket_vmnet'
AND f.path NOT LIKE '/opt/homebrew/Cellar/dnsmasq/%/sbin/dnsmasq'
AND f.path NOT LIKE '/opt/homebrew/Cellar/socket_vmnet/%/bin/socket_vmnet'