osquery-defense-kit/detection/initial_access/unexpected-webmail-download...

60 lines
1.4 KiB
SQL

-- Surface webmail downloads of an unexpected sort
--
-- false positives:
-- * Files without an extension or extensions not explicitly added to the allow list
--
-- platform: darwin
-- tags: persistent filesystem spotlight
SELECT file.path,
file.size,
datetime(file.btime, 'unixepoch') AS file_created,
magic.data,
hash.sha256,
LOWER(
REGEX_MATCH(RTRIM(file.path, '/'), '.*\.(.*?)$', 1)
) AS extension
FROM mdfind
LEFT JOIN file ON mdfind.path = file.path
LEFT JOIN magic ON file.path = magic.path
LEFT JOIN hash ON file.path = hash.path
WHERE mdfind.query = 'kMDItemWhereFroms == ''*https://mail.google.com/*'''
AND file.btime > (strftime('%s', 'now') -86400)
-- Extensions that would not normally raise suspicion if sent by e-mail (excludes dmg, iso, lnk, exe)
AND extension NOT IN (
'bz2',
'cer',
'csv',
'doc',
'docx',
'eml',
'gif',
'gz',
'htm',
'html',
'icloud',
'jpeg',
'jpg',
'mp3',
'mp4',
'mpeg',
'mpg',
'ods',
'odt',
'pdf',
'pem',
'pgp',
'png',
'ppt',
'pptx',
'pub',
'tar',
'tif',
'tiff',
'txt',
'wav',
'xls',
'xlsm',
'xlsx',
'zip',
'zstd'
)