Skip to content

Latest commit

 

History

History
32 lines (25 loc) · 1.14 KB

FIRST-S00042.md

File metadata and controls

32 lines (25 loc) · 1.14 KB

Rules: First Seen Ioreg Usage from User

Description

A user has executed a ioreg command not seen since the baseline period. The ioreg binary can be used to enumerate configurations on a Unix/macOS host and can be used by malware to ensure that code is not running on a virtual machine or sandbox. This rule utilizes data from the "LOOBins" project: https://github.com/infosecB/LOOBins - more information regarding this specific binary can be found via: https://www.loobins.io/binaries/ioreg/

Additional Details

Detail Value
Type First Seen
Category Discovery
Apply Risk to Entities user_username
Signal Name First Seen Ioreg Usage from User
Summary Expression {{user_username}} has executed a ioreg command from {{device_hostname}}
Retention Window 7776000000
Baseline Window 1209600000
Baseline Type PER_ENTITY
Score/Severity Static: 2
Enabled by Default True
Prototype False
Tags _mitreAttackTactic:TA0007, _mitreAttackTechnique:T1120

Vendors and Products

Fields Used

Origin Field
Normalized Schema baseImage
Normalized Schema parentBaseImage
Normalized Schema user_username