osquery-defense-kit/detection/evasion/missing-from-disk-linux.sql

53 lines
1.4 KiB
SQL

-- Processes that do not exist on disk, running in osquery's namespace
--
-- false positives:
-- * none observed
--
-- references:
-- * https://attack.mitre.org/techniques/T1070/004/ (Indicator Removal on Host: File Deletion)
--
-- tags: persistent process state
-- platform: linux
SELECT
p.pid,
p.euid,
p.cmdline,
p.path,
p.cgroup_path,
mnt_namespace,
p.cwd,
p.on_disk,
p.state,
file.inode,
pp.on_disk AS parent_on_disk,
pp.path AS parent_path,
pp.cmdline AS parent_cmdline,
pp.cwd AS parent_cwd,
ph.sha256 AS parent_sha256
FROM
processes p
LEFT JOIN file ON p.path = file.path
LEFT JOIN process_namespaces ON p.pid = process_namespaces.pid
LEFT JOIN processes pp ON p.parent = pp.pid
LEFT JOIN hash ph ON pp.path = ph.path
WHERE
p.on_disk != 1
AND p.path != ''
-- use osquery as the reference mount namespace
AND mnt_namespace IN (
SELECT DISTINCT
(mnt_namespace)
FROM
process_namespaces
JOIN processes ON processes.pid = process_namespaces.pid
WHERE
processes.name IN ('osqueryi', 'osqueryd')
)
-- This is truly a missing program, not just one that has been updated with a new binary.
AND file.inode IS NULL
AND p.path != '/bpfilter_umh'
-- Snap packages?
AND p.path NOT LIKE '/tmp/.mount_%'
AND p.path NOT LIKE '/home/%/.cache/yay/1password-cli/pkg/1password-cli/usr/bin/op'
AND p.path NOT IN ('/usr/bin/python3.10')