Unusual Process Execution - Temp

edit

Identifies processes running in a temporary folder. This is sometimes done by adversaries to hide malware.

Rule type: query

Rule indices:

  • auditbeat-*

Severity: medium

Risk score: 47

Runs every: 5 minutes

Searches indices from: now-6m (Date Math format, see also Additional look-back time)

Maximum signals per execution: 100

Tags:

  • Elastic
  • Linux

Version: 2 (version history)

Added (Elastic Stack release): 7.6.0

Last modified (Elastic Stack release): 7.7.0

Potential false positives

edit

Build systems, like Jenkins, may start processes in the /tmp directory. These can be exempted by name or by username.

Rule query

edit
process.working_directory:/tmp and event.action:executed

Rule version history

edit
Version 2 (7.7.0 release)

Updated query, changed from:

process.working_directory: /tmp and event.action:executed