|
| 1 | +name: MacOS AMOS Stealer - Virtual Machine Check Activity |
| 2 | +id: 4e41ad21-9761-426d-8aa1-083712ff9f30 |
| 3 | +version: 1 |
| 4 | +date: '2025-04-25' |
| 5 | +author: Nasreddine Bencherchali, Splunk, Alex Karkins |
| 6 | +status: production |
| 7 | +type: Anomaly |
| 8 | +description: | |
| 9 | + The following analytic detects AMOS Stealer VM check activity on macOS. It leverages osquery to monitor process events and identifies the execution of the "osascript" command along with specific commandline strings. This activity is significant |
| 10 | + as AMOS stealer was seen using this pattern in order to check if the host is a Virtual Machine or not. If confirmed malicious, this behavior indicate that the host is already infected by the AMOS stealer, which could allow attackers to execute arbitrary code, escalate privileges, steal information, or persist within the environment, posing a significant security risk. |
| 11 | +data_source: |
| 12 | + - osquery |
| 13 | +search: | |
| 14 | + `osquery_macro` name=es_process_events |
| 15 | + columns.cmdline="*osascript*" AND columns.cmdline="* -e *" AND columns.cmdline="*set*" AND columns.cmdline="*system_profiler*" AND columns.cmdline IN ("*VMware*", "*QEMU*") |
| 16 | + | rename columns.* as * |
| 17 | + | stats min(_time) as firstTime max(_time) as lastTime |
| 18 | + values(cmdline) as cmdline, |
| 19 | + values(pid) as pid, |
| 20 | + values(parent) as parent, |
| 21 | + values(path) as path, |
| 22 | + values(signing_id) as signing_id, |
| 23 | + by username host |
| 24 | + | rename |
| 25 | + username as user, |
| 26 | + cmdline as process, |
| 27 | + parent as parent_process, |
| 28 | + path as process_path, |
| 29 | + host as dest |
| 30 | + | `security_content_ctime(firstTime)` |
| 31 | + | `security_content_ctime(lastTime)` |
| 32 | + | `macos_amos_stealer___virtual_machine_check_activity_filter` |
| 33 | +how_to_implement: | |
| 34 | + This detection leverages osquery and endpoint security on MacOS. Follow the link in references, which describes how to setup process auditing in MacOS with endpoint security and osquery. |
| 35 | +known_false_positives: None identified. |
| 36 | +references: |
| 37 | + - https://osquery.readthedocs.io/en/stable/deployment/process-auditing/ |
| 38 | + - https://www.virustotal.com/gui/search/behaviour_processes%253A%2522osascript%2520-e%2520set%2522%2520AND%2520behaviour_processes%253A%2522system_profiler%2522%2520AND%2520(behaviour_processes%253A%2522VMware%2522%2520OR%2520behaviour_processes%253A%2522QEMU%2522)?type=files |
| 39 | +drilldown_searches: |
| 40 | + - name: View the detection results for - "$user$" and "$dest$" |
| 41 | + search: '%original_detection_search% | search user = "$user$" dest = "$dest$"' |
| 42 | + earliest_offset: $info_min_time$ |
| 43 | + latest_offset: $info_max_time$ |
| 44 | + - name: View risk events for the last 7 days for - "$user$" and "$dest$" |
| 45 | + search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$user$", |
| 46 | + "$dest$") starthoursago=168 | stats count min(_time) as firstTime max(_time) |
| 47 | + as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk |
| 48 | + Message" values(analyticstories) as "Analytic Stories" values(annotations._all) |
| 49 | + as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" |
| 50 | + by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`' |
| 51 | + earliest_offset: $info_min_time$ |
| 52 | + latest_offset: $info_max_time$ |
| 53 | +rba: |
| 54 | + message: AMOS Stealer activity on host $dest$ by user $user$ |
| 55 | + risk_objects: |
| 56 | + - field: user |
| 57 | + type: user |
| 58 | + score: 40 |
| 59 | + - field: dest |
| 60 | + type: system |
| 61 | + score: 40 |
| 62 | + threat_objects: [] |
| 63 | +tags: |
| 64 | + analytic_story: |
| 65 | + - AMOS Stealer |
| 66 | + asset_type: Endpoint |
| 67 | + mitre_attack_id: |
| 68 | + - T1059.002 |
| 69 | + product: |
| 70 | + - Splunk Enterprise |
| 71 | + - Splunk Enterprise Security |
| 72 | + - Splunk Cloud |
| 73 | + security_domain: endpoint |
| 74 | +tests: |
| 75 | +- name: True Positive Test |
| 76 | + attack_data: |
| 77 | + - data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1059.002/amos_stealer/amos_stealer.log |
| 78 | + source: osquery |
| 79 | + sourcetype: osquery:results |
0 commit comments