Hooking Proc File System File Operations By Overriding The Function Pointers
Usage of kernel modules to hook file operations
MITRE ATT&CK
Defense Evasion: Rootkit
Rego Policy
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
|
package tracee.TRC_16
import data.tracee.helpers
__rego_metadoc__ := {
"id": "TRC-16",
"version": "0.1.0",
"name": "Hooking proc file system file operations by overriding the function pointers",
"eventName": "proc_fops_hooking",
"description": "Usage of kernel modules to hook file operations",
"tags": ["linux"],
"properties": {
"Severity": 4,
"MITRE ATT&CK": "Defense Evasion: Rootkit",
},
}
eventSelectors := [{
"source": "tracee",
"name": "hooked_proc_fops",
}]
tracee_selected_events[eventSelector] {
eventSelector := eventSelectors[_]
}
tracee_match = res {
input.eventName == "hooked_proc_fops"
hooked_proc_fops_arr := helpers.get_tracee_argument("hooked_fops_pointers")
c := count(hooked_proc_fops_arr)
c > 0
res := {"hooked file_operations": hooked_proc_fops_arr}
}
|