Skip to content

Latest commit

 

History

History
45 lines (31 loc) · 1.89 KB

execution_suspicious_executable_file_modification_via_docker.md

File metadata and controls

45 lines (31 loc) · 1.89 KB

Suspicious Executable File Modification via Docker


Metadata

  • Author: Elastic

  • Description: Detects when Docker or Docker Desktop processes modify executable files within user-accessible or temporary directories. These locations are commonly used by attackers to stage payloads or drop binaries during post-exploitation activity.

  • UUID: f5b1afc4-207c-11f0-aa05-f661ea17fbcd

  • Integration: endpoint

  • Language: [EQL]

  • Source File: Suspicious Executable File Modification via Docker

Query

file where event.action == "modification" and
  (process.name in ("docker", "Docker Desktop") or process.name like "com.docker*") and
  file.Ext.header_bytes like~ ("cffaedfe*", "cafebabe*") and
  file.path like ("/tmp/*", "/private/tmp/*", "/Users/Shared/*", "/Users/*/Public/*", "/Users/*/Downloads/*", "/Users/*/Desktop/*", "/Users/*/Documents/*")

Notes

  • Executable file writes from Docker processes in user or temp directories are suspicious in most environments.
  • This behavior may indicate container escape attempts, tool staging, or post-exploitation binary drops.
  • The header byte patterns 'cffaedfe' (Mach-O) and 'cafebabe' (Java class files) help identify actual executables being written.

MITRE ATT&CK Techniques

References

License

  • Elastic License v2