Rule Library

Sigma Rules

1,607 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionlowtest

JAMF MDM Execution

Detects execution of the "jamf" binary to create user accounts and run commands. For example, the binary can be abused by attackers on the system in order to bypass security controls or remove application control polices.

macOSProcess Creation
TA0002 · Execution
Jay PanditTue Aug 22macos
Detectionhightest

JXA In-memory Execution Via OSAScript

Detects possible malicious execution of JXA in-memory via OSAScript

macOSProcess Creation
T1059.002 · AppleScriptT1059.007 · JavaScriptTA0002 · Execution
Sohan G (D4rkCiph3r)Tue Jan 31macos
Detectionmediumtest

Launch Agent/Daemon Execution Via Launchctl

Detects the execution of programs as Launch Agents or Launch Daemons using launchctl on macOS.

macOSProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1569.001 · Launchctl+2
Pratinav ChandraMon May 13macos
Detectionlowtest

Local System Accounts Discovery - MacOs

Detects enumeration of local systeam accounts on MacOS

macOSProcess Creation
TA0007 · DiscoveryT1087.001 · Local Account
Alejandro Ortuno+1Thu Oct 08macos
Detectioninformationaltest

Local Groups Discovery - MacOs

Detects enumeration of local system groups

macOSProcess Creation
TA0007 · DiscoveryT1069.001 · Local Groups
Ömer Günal+2Sun Oct 11macos
Detectionlowtest

MacOS Network Service Scanning

Detects enumeration of local or remote network services.

macOSProcess Creation
TA0007 · DiscoveryT1046 · Network Service Discovery
Alejandro Ortuno+1Wed Oct 21macos
Detectioninformationaltest

Network Sniffing - MacOs

Detects the usage of tooling to sniff network traffic. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.

macOSProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1040 · Network Sniffing
Alejandro Ortuno+1Wed Oct 14macos
Detectionmediumtest

File Download Via Nscurl - MacOS

Detects the execution of the nscurl utility in order to download files.

macOSProcess Creation
TA0005 · Defense EvasionTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Daniel CortezTue Jun 04macos
Detectionhightest

Suspicious Microsoft Office Child Process - MacOS

Detects suspicious child processes spawning from microsoft office suite applications such as word or excel. This could indicates malicious macro execution

macOSProcess Creation
TA0002 · ExecutionTA0003 · PersistenceT1059.002 · AppleScriptT1137.002 · Office Test+1
Sohan G (D4rkCiph3r)Tue Jan 31macos
Detectionhightest

OSACompile Run-Only Execution

Detects potential suspicious run-only executions compiled using OSACompile

macOSProcess Creation
T1059.002 · AppleScriptTA0002 · Execution
Sohan G (D4rkCiph3r)Tue Jan 31macos
Detectionmediumtest

Payload Decoded and Decrypted via Built-in Utilities

Detects when a built-in utility is used to decode and decrypt a payload after a macOS disk image (DMG) is executed. Malware authors may attempt to evade detection and trick users into executing malicious code by encoding and encrypting their payload and placing it in a disk image file. This behavior is consistent with adware or malware families such as Bundlore and Shlayer.

macOSProcess Creation
T1059 · Command and Scripting InterpreterT1204 · User ExecutionTA0002 · ExecutionT1140 · Deobfuscate/Decode Files or Information+3
Tim Rauch+1Mon Oct 17macos
Detectionhightest

Potential Persistence Via PlistBuddy

Detects potential persistence activity using LaunchAgents or LaunchDaemons via the PlistBuddy utility

macOSProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1543.001 · Launch AgentT1543.004 · Launch Daemon
Sohan G (D4rkCiph3r)Sat Feb 18macos
Detectionmediumexperimental

Remote Access Tool - Potential MeshAgent Execution - MacOS

Detects potential execution of MeshAgent which is a tool used for remote access. Historical data shows that threat actors rename MeshAgent binary to evade detection. Matching command lines with the '--meshServiceName' argument can indicate that the MeshAgent is being used for remote access.

macOSProcess Creation
TA0011 · Command and Controlattack.t1219.002
Norbert Jaśniewicz (AlphaSOC)Mon May 19macos
Detectionhighexperimental

Remote Access Tool - Renamed MeshAgent Execution - MacOS

Detects the execution of a renamed instance of the Remote Monitoring and Management (RMM) tool, MeshAgent. RMM tools such as MeshAgent are commonly utilized by IT administrators for legitimate remote support and system management. However, malicious actors may exploit these tools by renaming them to bypass detection mechanisms, enabling unauthorized access and control over compromised systems.

macOSProcess Creation
TA0011 · Command and ControlTA0005 · Defense Evasionattack.t1219.002T1036.003 · Rename System Utilities
Norbert Jaśniewicz (AlphaSOC)Mon May 19macos
Detectionlowtest

Remote Access Tool - Team Viewer Session Started On MacOS Host

Detects the command line executed when TeamViewer starts a session started by a remote host. Once a connection has been started, an investigator can verify the connection details by viewing the "incoming_connections.txt" log file in the TeamViewer folder.

macOSProcess Creation
TA0003 · PersistenceTA0001 · Initial AccessT1133 · External Remote Services
Josh Nickels+1Mon Mar 11macos
Detectioninformationaltest

Macos Remote System Discovery

Detects the enumeration of other remote systems.

macOSProcess Creation
TA0007 · DiscoveryT1018 · Remote System Discovery
Alejandro Ortuno+1Thu Oct 22macos
Detectionmediumtest

Scheduled Cron Task/Job - MacOs

Detects abuse of the cron utility to perform task scheduling for initial or recurring execution of malicious code. Detection will focus on crontab jobs uploaded from the tmp folder.

macOSProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.003 · Cron
Alejandro Ortuno+1Tue Oct 06macos
Detectionlowtest

Screen Capture - macOS

Detects attempts to use screencapture to collect macOS screenshots

macOSProcess Creation
TA0009 · CollectionT1113 · Screen Capture
remotephone+1Tue Oct 13macos
Detectionmediumtest

Security Software Discovery - MacOs

Detects usage of system utilities (only grep for now) to discover security software discovery

macOSProcess Creation
TA0007 · DiscoveryT1518.001 · Security Software Discovery
Daniil Yugoslavskiy+1Mon Oct 19macos
Detectionlowtest

Space After Filename - macOS

Detects attempts to masquerade as legitimate files by adding a space to the end of the filename.

macOSProcess Creation
TA0005 · Defense EvasionT1036.006 · Space after Filename
remotephoneSat Nov 20macos
Detectionlowtest

Split A File Into Pieces

Detection use of the command "split" to split files into parts and possible transfer.

macOSProcess Creation
TA0010 · ExfiltrationT1030 · Data Transfer Size Limits
Igor Fits+2Thu Oct 15macos
Detectionmediumtest

Osacompile Execution By Potentially Suspicious Applet/Osascript

Detects potential suspicious applet or osascript executing "osacompile".

macOSProcess Creation
TA0002 · ExecutionT1059.002 · AppleScript
Sohan G (D4rkCiph3r)+1Mon Apr 03macos
Detectionmediumtest

Suspicious Browser Child Process - MacOS

Detects suspicious child processes spawned from browsers. This could be a result of a potential web browser exploitation.

macOSProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1189 · Drive-by CompromiseT1203 · Exploitation for Client Execution+1
Sohan G (D4rkCiph3r)Wed Apr 05macos
Detectionmediumtest

Suspicious Execution via macOS Script Editor

Detects when the macOS Script Editor utility spawns an unusual child process.

macOSProcess Creation
T1566 · PhishingT1566.002 · Spearphishing LinkTA0001 · Initial AccessT1059 · Command and Scripting Interpreter+7
Tim Rauch+1Fri Oct 21macos
Detectionmediumtest

Potential Discovery Activity Using Find - MacOS

Detects usage of "find" binary in a suspicious manner to perform discovery

macOSProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28macos
Detectionmediumtest

Suspicious History File Operations

Detects commandline operations on shell history files

macOSProcess Creation
TA0006 · Credential AccessT1552.003 · Bash History
Mikhail Larin+1Sat Oct 17macos
Detectionmediumtest

Potential In-Memory Download And Compile Of Payloads

Detects potential in-memory downloading and compiling of applets using curl and osacompile as seen used by XCSSET malware

macOSProcess Creation
TA0011 · Command and ControlTA0002 · ExecutionT1059.007 · JavaScriptT1105 · Ingress Tool Transfer
Sohan G (D4rkCiph3r)+1Tue Aug 22macos
Detectionmediumtest

Suspicious MacOS Firmware Activity

Detects when a user manipulates with Firmward Password on MacOS. NOTE - this command has been disabled on silicon-based apple computers.

macOSProcess Creation
TA0040 · Impact
Austin SongerThu Sep 30macos
Detectioninformationaltest

System Network Discovery - macOS

Detects enumeration of local network configuration

macOSProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration Discovery
remotephone+1Tue Oct 06macos
Detectionmediumtest

System Information Discovery Using sw_vers

Detects the use of "sw_vers" for system information discovery

macOSProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
Joseliyo SanchezWed Dec 20macos
Detectionmediumtest

User Added To Admin Group Via Sysadminctl

Detects attempts to create and add an account to the admin group via "sysadminctl"

macOSProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial AccessTA0004 · Privilege Escalation+1
Sohan G (D4rkCiph3r)Sun Mar 19macos
Detectionlowtest

Guest Account Enabled Via Sysadminctl

Detects attempts to enable the guest account using the sysadminctl utility

macOSProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+2
Sohan G (D4rkCiph3r)Sat Feb 18macos
Detectionmediumtest

System Information Discovery Via Sysctl - MacOS

Detects the execution of "sysctl" with specific arguments that have been used by threat actors and malware. It provides system hardware information. This process is primarily used to detect and avoid virtualization and analysis environments.

macOSProcess Creation
TA0005 · Defense EvasionT1497.001 · System ChecksTA0007 · DiscoveryT1082 · System Information Discovery
Pratinav ChandraMon May 27macos
Detectioninformationaltest

System Network Connections Discovery - MacOs

Detects usage of system utilities to discover system network connections

macOSProcess Creation
TA0007 · DiscoveryT1049 · System Network Connections Discovery
Daniil Yugoslavskiy+1Mon Oct 19macos
Detectionmediumtest

System Information Discovery Using System_Profiler

Detects the execution of "system_profiler" with specific "Data Types" that have been seen being used by threat actors and malware. It provides system hardware and software configuration information. This process is primarily used for system information discovery. However, "system_profiler" can also be used to determine if virtualization software is being run for defense evasion purposes.

macOSProcess Creation
TA0007 · DiscoveryTA0005 · Defense EvasionT1082 · System Information DiscoveryT1497.001 · System Checks
Stephen Lincoln (AttackIQ)Tue Jan 02macos
Detectioninformationaltest

System Shutdown/Reboot - MacOs

Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems.

macOSProcess Creation
TA0040 · ImpactT1529 · System Shutdown/Reboot
Igor Fits+2Mon Oct 19macos
Detectionhightest

Potential Base64 Decoded From Images

Detects the use of tail to extract bytes at an offset from an image and then decode the base64 value to create a new file with the decoded content. The detected execution is a bash one-liner.

macOSProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
Joseliyo SanchezWed Dec 20macos
Detectionmediumtest

Time Machine Backup Deletion Attempt Via Tmutil - MacOS

Detects deletion attempts of MacOS Time Machine backups via the native backup utility "tmutil". An adversary may perform this action before launching a ransonware attack to prevent the victim from restoring their files.

macOSProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Pratinav ChandraWed May 29macos
Detectionmediumtest

Time Machine Backup Disabled Via Tmutil - MacOS

Detects disabling of Time Machine (Apple's automated backup utility software) via the native macOS backup utility "tmutil". An attacker can use this to prevent backups from occurring.

macOSProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Pratinav ChandraWed May 29macos
Detectionmediumtest

New File Exclusion Added To Time Machine Via Tmutil - MacOS

Detects the addition of a new file or path exclusion to MacOS Time Machine via the "tmutil" utility. An adversary could exclude a path from Time Machine backups to prevent certain files from being backed up.

macOSProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Pratinav ChandraWed May 29macos
Detectionhightest

Potential WizardUpdate Malware Infection

Detects the execution traces of the WizardUpdate malware. WizardUpdate is a macOS trojan that attempts to infiltrate macOS machines to steal data and it is associated with other types of malicious payloads, increasing the chances of multiple infections on a device.

macOSProcess Creation
TA0011 · Command and Control
Tim Rauch+1Mon Oct 17macos
Detectionlowtest

Gatekeeper Bypass via Xattr

Detects macOS Gatekeeper bypass via xattr utility

macOSProcess Creation
TA0005 · Defense EvasionT1553.001 · Gatekeeper Bypass
Daniil Yugoslavskiy+1Mon Oct 19macos
Detectionmediumtest

Potential XCSSET Malware Infection

Identifies the execution traces of the XCSSET malware. XCSSET is a macOS trojan that primarily spreads via Xcode projects and maliciously modifies applications. Infected users are also vulnerable to having their credentials, accounts, and other vital data stolen.

macOSProcess Creation
TA0011 · Command and Control
Tim Rauch+1Mon Oct 17macos
Detectionmediumtest

7Zip Compressing Dump Files

Detects execution of 7z in order to compress a file with a ".dmp"/".dump" extension, which could be a step in a process of dump file exfiltration.

WindowsProcess Creation
TA0009 · CollectionT1560.001 · Archive via Utility
Nasreddine Bencherchali (Nextron Systems)Tue Sep 27windows
Detectionmediumtest

Compress Data and Lock With Password for Exfiltration With 7-ZIP

An adversary may compress or encrypt data that is collected prior to exfiltration using 3rd party utilities

WindowsProcess Creation
TA0009 · CollectionT1560.001 · Archive via Utility
François HubautTue Jul 27windows
Detectionmediumtest

Potential DLL Injection Via AccCheckConsole

Detects the execution "AccCheckConsole" a command-line tool for verifying the accessibility implementation of an application's UI. One of the tests that this checker can run are called "verification routine", which tests for things like Consistency, Navigation, etc. The tool allows a user to provide a DLL that can contain a custom "verification routine". An attacker can build such DLLs and pass it via the CLI, which would then be loaded in the context of the "AccCheckConsole" utility.

WindowsProcess Creation
TA0002 · Executiondetection.threat-hunting
Florian Roth (Nextron Systems)Thu Jan 06windows
Detectionhightest

Suspicious AddinUtil.EXE CommandLine Execution

Detects execution of the Add-In deployment cache updating utility (AddInutil.exe) with suspicious Addinroot or Pipelineroot paths. An adversary may execute AddinUtil.exe with uncommon Addinroot/Pipelineroot paths that point to the adversaries Addins.Store payload.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Nasreddine Bencherchali (Nextron Systems)+2Mon Sep 18windows
Detectionmediumtest

Uncommon Child Process Of AddinUtil.EXE

Detects uncommon child processes of the Add-In deployment cache updating utility (AddInutil.exe) which could be a sign of potential abuse of the binary to proxy execution via a custom Addins.Store payload.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Michael McKinley+1Mon Sep 18windows