splApache-2.0from splunk/security_content
Suspicious PlistBuddy Usage via OSquery
The following analytic detects the use of the PlistBuddy utility on macOS to create or modify property list (.plist) files. It leverages OSQuery to monitor process events, specifically looking for commands that interact with LaunchAgents and set properties like RunAtLoad. This activity is significant because PlistBuddy can be used to establish persistence mechanisms, as seen in malware like Silver Sparrow. If confirmed malicious, this could allow an attacker to maintain persistence, execute arbitrary commands, and potentially escalate privileges on the compromised system.
Quality
41
FP risk
—
Forks
0
Views
0
Rule sourcedetections/endpoint/suspicious_plistbuddy_usage_via_osquery.yml
`osquery_process` "columns.cmdline"="*LaunchAgents*" OR "columns.cmdline"="*RunAtLoad*" OR "columns.cmdline"="*true*"
| `suspicious_plistbuddy_usage_via_osquery_filter`