EXPLORE
← Back to Explore
sigmamediumHunting

Suspicious Browser Child Process - MacOS

Detects suspicious child processes spawned from browsers. This could be a result of a potential web browser exploitation.

MITRE ATT&CK

initial-accessexecution

Detection Query

selection:
  ParentImage|contains:
    - com.apple.WebKit.WebContent
    - firefox
    - Google Chrome Helper
    - Google Chrome
    - Microsoft Edge
    - Opera
    - Safari
    - Tor Browser
  Image|endswith:
    - /bash
    - /curl
    - /dash
    - /ksh
    - /osascript
    - /perl
    - /php
    - /pwsh
    - /python
    - /sh
    - /tcsh
    - /wget
    - /zsh
filter_main_generic:
  CommandLine|contains: --defaults-torrc
filter_main_ms_autoupdate:
  CommandLine|contains: /Library/Application Support/Microsoft/MAU*/Microsoft
    AutoUpdate.app/Contents/MacOS/msupdate
filter_main_chrome:
  ParentImage|contains:
    - Google Chrome Helper
    - Google Chrome
  CommandLine|contains:
    - /Volumes/Google Chrome/Google
      Chrome.app/Contents/Frameworks/*/Resources/install.sh
    - /Applications/Google Chrome.app/Contents/Frameworks/Google Chrome
      Framework.framework/*/Resources/keystone_promote_preflight.sh
    - /Applications/Google Chrome.app/Contents/Frameworks/Google Chrome
      Framework.framework/*/Resources/keystone_promote_postflight.sh
filter_main_ms_edge:
  ParentImage|contains: Microsoft Edge
  CommandLine|contains:
    - IOPlatformExpertDevice
    - hw.model
filter_main_chromerecovery:
  ParentImage|contains:
    - Google Chrome Helper
    - Google Chrome
  CommandLine|contains|all:
    - /Users/
    - /Library/Application Support/Google/Chrome/recovery/
    - /ChromeRecovery
filter_optional_null:
  CommandLine: null
filter_optional_empty:
  CommandLine: ""
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*

Author

Sohan G (D4rkCiph3r)

Created

2023-04-05

Data Sources

macosProcess Creation Events

Platforms

macos

Tags

attack.initial-accessattack.executionattack.t1189attack.t1203attack.t1059
Raw Content
title: Suspicious Browser Child Process - MacOS
id: 0250638a-2b28-4541-86fc-ea4c558fa0c6
status: test
description: Detects suspicious child processes spawned from browsers. This could be a result of a potential web browser exploitation.
references:
    - https://fr.slideshare.net/codeblue_jp/cb19-recent-apt-attack-on-crypto-exchange-employees-by-heungsoo-kang
    - https://github.com/elastic/detection-rules/blob/4312d8c9583be524578a14fe6295c3370b9a9307/rules/macos/execution_initial_access_suspicious_browser_childproc.toml
author: Sohan G (D4rkCiph3r)
date: 2023-04-05
tags:
    - attack.initial-access
    - attack.execution
    - attack.t1189
    - attack.t1203
    - attack.t1059
logsource:
    category: process_creation
    product: macos
detection:
    selection:
        ParentImage|contains:
            - 'com.apple.WebKit.WebContent'
            - 'firefox'
            - 'Google Chrome Helper'
            - 'Google Chrome'
            - 'Microsoft Edge'
            - 'Opera'
            - 'Safari'
            - 'Tor Browser'
        Image|endswith:
            - '/bash'
            - '/curl'
            - '/dash'
            - '/ksh'
            - '/osascript'
            - '/perl'
            - '/php'
            - '/pwsh'
            - '/python'
            - '/sh'
            - '/tcsh'
            - '/wget'
            - '/zsh'
    filter_main_generic:
        CommandLine|contains: '--defaults-torrc' # Informs tor to use default config file
    filter_main_ms_autoupdate:
        CommandLine|contains: '/Library/Application Support/Microsoft/MAU*/Microsoft AutoUpdate.app/Contents/MacOS/msupdate' # Microsoft AutoUpdate utility
    filter_main_chrome:
        ParentImage|contains:
            - 'Google Chrome Helper'
            - 'Google Chrome'
        CommandLine|contains:
            - '/Volumes/Google Chrome/Google Chrome.app/Contents/Frameworks/*/Resources/install.sh' # Install the Google Chrome browser
            - '/Applications/Google Chrome.app/Contents/Frameworks/Google Chrome Framework.framework/*/Resources/keystone_promote_preflight.sh' # Updates the Google Chrome branding configuration files
            - '/Applications/Google Chrome.app/Contents/Frameworks/Google Chrome Framework.framework/*/Resources/keystone_promote_postflight.sh' # Script that performs the post-installation tasks
    filter_main_ms_edge:
        ParentImage|contains: 'Microsoft Edge'
        CommandLine|contains:
            - 'IOPlatformExpertDevice' # Retrieves the IOPlatformUUID (parent process - Microsoft Edge)
            - 'hw.model' # Retrieves model name of the computer's hardware (parent process - Microsoft Edge)
    filter_main_chromerecovery:
        ParentImage|contains:
            - 'Google Chrome Helper'
            - 'Google Chrome'
        CommandLine|contains|all:
            - '/Users/'
            - '/Library/Application Support/Google/Chrome/recovery/'
            - '/ChromeRecovery'
    filter_optional_null:
        # Aoids alerting for the events which do not have command-line arguments
        CommandLine: null
    filter_optional_empty:
        # Aoids alerting for the events which do not have command-line arguments
        CommandLine: ''
    condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
falsepositives:
    - Legitimate browser install, update and recovery scripts
level: medium