Unusual Process Execution - Temp

edit

Identifies processes running in a temporary folder. This is sometimes done by adversaries to hide malware.

Rule indices:

  • auditbeat-*

Severity: medium

Risk score: 47

Runs every: 5 minutes

Searches indices from: now-6m (Date Math format, see also Additional look-back time)

Maximum signals per execution: 100

Tags:

  • Elastic
  • Linux

Rule version: 1

Added (Elastic Stack release): 7.6.0

Potential false positives

edit

Build systems, like Jenkins, may start processes in the /tmp directory. These can be exempted by name or by username.

Rule query

edit
process.working_directory: /tmp and event.action:executed