-
Notifications
You must be signed in to change notification settings - Fork 557
/
Copy pathexecution_suspicious_executable_file_modification_via_docker.toml
31 lines (31 loc) · 1.59 KB
/
execution_suspicious_executable_file_modification_via_docker.toml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
[hunt]
author = "Elastic"
name = "Suspicious Executable File Modification via Docker"
uuid = "f5b1afc4-207c-11f0-aa05-f661ea17fbcd"
description = """
Detects when Docker or Docker Desktop processes modify executable files within user-accessible or temporary directories. These locations are commonly used by attackers to stage payloads or drop binaries during post-exploitation activity.
"""
integration = ["endpoint"]
language = ["EQL"]
license = "Elastic License v2"
mitre = ["T1105", "T1204.002"]
notes = [
"Executable file writes from Docker processes in user or temp directories are suspicious in most environments.",
"This behavior may indicate container escape attempts, tool staging, or post-exploitation binary drops.",
"The header byte patterns 'cffaedfe' (Mach-O) and 'cafebabe' (Java class files) help identify actual executables being written."
]
query = [
'''
file where event.action == "modification" and
(process.name in ("docker", "Docker Desktop") or process.name like "com.docker*") and
file.Ext.header_bytes like~ ("cffaedfe*", "cafebabe*") and
file.path like ("/tmp/*", "/private/tmp/*", "/Users/Shared/*", "/Users/*/Public/*", "/Users/*/Downloads/*", "/Users/*/Desktop/*", "/Users/*/Documents/*")
'''
]
references = [
"https://www.elastic.co/security-labs/dprk-code-of-conduct",
"https://unit42.paloaltonetworks.com/slow-pisces-new-custom-malware/",
"https://slowmist.medium.com/cryptocurrency-apt-intelligence-unveiling-lazarus-groups-intrusion-techniques-a1a6efda7d34",
"https://x.com/safe/status/1897663514975649938",
"https://www.sygnia.co/blog/sygnia-investigation-bybit-hack/"
]