🍎 macOS

Suspicious Process Modifying LaunchDaemons

Detects non-standard processes creating or modifying files in the /Library/LaunchDaemons/ directory. This is a primary indicator of privilege escalation attempts via service hijacking.

Author: Chris S (avrgsec_)
Date: 2025-11-06
Level: HIGH
Status: experimental

Sigma Rule

title: Suspicious Process Modifying LaunchDaemons
id: 1d2e3f4a-5b6c-7d8e-9f0a-1b2c3d4e5f6a
status: experimental
description: |
  Detects non-standard processes creating or modifying files in the /Library/LaunchDaemons/ directory.
  This is a primary indicator of privilege escalation attempts via service hijacking.
references:
  - https://www.exploit-db.com/exploits/52316
  - https://github.com/mbanyamer
author: Chris S (avrgsec_)
date: "2025-11-06"
tags:
  - attack.persistence
  - attack.t1543.004
logsource:
  category: file_event
  product: macos
detection:
  selection:
    TargetFilename|startswith: '/Library/LaunchDaemons/'
    TargetFilename|endswith: '.plist'
  filter_legit_installers:
    Image|endswith:
      - '/usr/sbin/installer'
      - '/usr/libexec/mdmclient'
      - '/usr/sbin/softwareupdated'
  condition: selection and not filter_legit_installers
falsepositives:
  - Poorly designed third-party application installers that do not use standard macOS installer frameworks.
  - It should also be noted that tools like Jamf can cause false positives so consider adding that to filter_legit_installers if applicable.
level: high

False Positives

  • Poorly designed third-party application installers that do not use standard macOS installer frameworks.
  • It should also be noted that tools like Jamf can cause false positives so consider adding that to filter_legit_installers if applicable.

References

← Back to all detections