Hooking Proc File System File Operations By Overriding The Function Pointers

CRITICAL
Source
Tracee
ID
TRC-16
Version
0.1.0
Date
10 Apr 2024

Hooking Proc File System File Operations By Overriding The Function Pointers

Usage of kernel modules to hook file operations

MITRE ATT&CK

Defense Evasion: Rootkit

Rego Policy

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
package tracee.TRC_16

import data.tracee.helpers

__rego_metadoc__ := {
	"id": "TRC-16",
	"version": "0.1.0",
	"name": "Hooking proc file system file operations by overriding the function pointers",
	"eventName": "proc_fops_hooking",
	"description": "Usage of kernel modules to hook file operations",
	"tags": ["linux"],
	"properties": {
		"Severity": 4,
		"MITRE ATT&CK": "Defense Evasion: Rootkit",
	},
}

eventSelectors := [{
	"source": "tracee",
	"name": "hooked_proc_fops",
}]

tracee_selected_events[eventSelector] {
	eventSelector := eventSelectors[_]
}

tracee_match = res {
	input.eventName == "hooked_proc_fops"
	hooked_proc_fops_arr := helpers.get_tracee_argument("hooked_fops_pointers")
	c := count(hooked_proc_fops_arr)
	c > 0
	res := {"hooked file_operations": hooked_proc_fops_arr}
}