The following analytic identifies a suspicious process creation of At application. This process can be used by malware, adversaries and red teamers to create persistence entry to the targeted or compromised host with their malicious code. This anomaly detection can be a good indicator to investigate the event before and after this process execution, when it was executed and what schedule task it will execute.
- Type: Anomaly
- Product: Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
- Datamodel: Endpoint
- Last Updated: 2021-12-17
- Author: Teoderick Contreras, Splunk
- ID: bf0a378e-5f3c-11ec-a6de-acde48001122
|T1053.001||At (Linux)||Execution, Persistence, Privilege Escalation|
|T1053||Scheduled Task/Job||Execution, Persistence, Privilege Escalation|
| tstats `security_content_summariesonly` count from datamodel=Endpoint.Processes where Processes.process_name = at OR Processes.parent_process_name = at by Processes.dest Processes.user Processes.parent_process_name Processes.process_name Processes.process Processes.process_id Processes.parent_process_id Processes.process_guid | `drop_dm_object_name(Processes)` | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `linux_at_application_execution_filter`
Associated Analytic Story
How To Implement
To successfully implement this search, you need to be ingesting logs with the process name, parent process, and command-line executions from your endpoints. If you are using Sysmon, you can use the Add-on for Linux Sysmon from Splunkbase.
Kill Chain Phase
- Privilege Escalation
Known False Positives
Administrator or network operator can use this application for automation purposes. Please update the filter macros to remove false positives.
|9.0||30||30||At application was executed in $dest$|
source | version: 1