mirror of
https://github.com/chainguard-dev/osquery-defense-kit
synced 2024-12-11 08:34:34 +00:00
53 lines
1.4 KiB
SQL
53 lines
1.4 KiB
SQL
-- Processes that do not exist on disk, running in osquery's namespace
|
|
--
|
|
-- false positives:
|
|
-- * none observed
|
|
--
|
|
-- references:
|
|
-- * https://attack.mitre.org/techniques/T1070/004/ (Indicator Removal on Host: File Deletion)
|
|
--
|
|
-- tags: persistent process state
|
|
-- platform: linux
|
|
SELECT
|
|
p.pid,
|
|
p.euid,
|
|
p.cmdline,
|
|
p.path,
|
|
p.cgroup_path,
|
|
mnt_namespace,
|
|
p.cwd,
|
|
p.on_disk,
|
|
p.state,
|
|
file.inode,
|
|
pp.on_disk AS parent_on_disk,
|
|
pp.path AS parent_path,
|
|
pp.cmdline AS parent_cmdline,
|
|
pp.cwd AS parent_cwd,
|
|
ph.sha256 AS parent_sha256
|
|
FROM
|
|
processes p
|
|
LEFT JOIN file ON p.path = file.path
|
|
LEFT JOIN process_namespaces ON p.pid = process_namespaces.pid
|
|
LEFT JOIN processes pp ON p.parent = pp.pid
|
|
LEFT JOIN hash ph ON pp.path = ph.path
|
|
WHERE
|
|
p.on_disk != 1
|
|
AND p.path != ''
|
|
-- use osquery as the reference mount namespace
|
|
AND mnt_namespace IN (
|
|
SELECT DISTINCT
|
|
(mnt_namespace)
|
|
FROM
|
|
process_namespaces
|
|
JOIN processes ON processes.pid = process_namespaces.pid
|
|
WHERE
|
|
processes.name IN ('osqueryi', 'osqueryd')
|
|
)
|
|
-- This is truly a missing program, not just one that has been updated with a new binary.
|
|
AND file.inode IS NULL
|
|
AND p.path != '/bpfilter_umh'
|
|
-- Snap packages?
|
|
AND p.path NOT LIKE '/tmp/.mount_%'
|
|
AND p.path NOT LIKE '/home/%/.cache/yay/1password-cli/pkg/1password-cli/usr/bin/op'
|
|
AND p.path NOT IN ('/usr/bin/python3.10')
|