EXPLORE
← Back to Explore
sigmalowHunting

Local System Accounts Discovery - MacOs

Detects enumeration of local systeam accounts on MacOS

MITRE ATT&CK

discovery

Detection Query

selection_1:
  Image|endswith: /dscl
  CommandLine|contains|all:
    - list
    - /users
selection_2:
  Image|endswith: /dscacheutil
  CommandLine|contains|all:
    - -q
    - user
selection_3:
  CommandLine|contains: "'x:0:'"
selection_4:
  Image|endswith: /cat
  CommandLine|contains:
    - /etc/passwd
    - /etc/sudoers
selection_5:
  Image|endswith: /id
selection_6:
  Image|endswith: /lsof
  CommandLine|contains: -u
condition: 1 of selection*

Author

Alejandro Ortuno, oscd.community

Created

2020-10-08

Data Sources

macosProcess Creation Events

Platforms

macos

Tags

attack.discoveryattack.t1087.001
Raw Content
title: Local System Accounts Discovery - MacOs
id: ddf36b67-e872-4507-ab2e-46bda21b842c
status: test
description: Detects enumeration of local systeam accounts on MacOS
references:
    - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1087.001/T1087.001.md
author: Alejandro Ortuno, oscd.community
date: 2020-10-08
modified: 2022-11-27
tags:
    - attack.discovery
    - attack.t1087.001
logsource:
    category: process_creation
    product: macos
detection:
    selection_1:
        Image|endswith: '/dscl'
        CommandLine|contains|all:
            - 'list'
            - '/users'
    selection_2:
        Image|endswith: '/dscacheutil'
        CommandLine|contains|all:
            - '-q'
            - 'user'
    selection_3:
        CommandLine|contains: '''x:0:'''
    selection_4:
        Image|endswith: '/cat'
        CommandLine|contains:
            - '/etc/passwd'
            - '/etc/sudoers'
    selection_5:
        Image|endswith: '/id'
    selection_6:
        Image|endswith: '/lsof'
        CommandLine|contains: '-u'
    condition: 1 of selection*
falsepositives:
    - Legitimate administration activities
level: low