JXA In-memory Execution Via OSAScript

Rule Info

Name
JXA In-memory Execution Via OSAScript
Author
Sohan G (D4rkCiph3r)
Description
Detects possible malicious execution of JXA in-memory via OSAScript
Date
2023-01-31 00:00:00
Modified
None
Id
f1408a58-0e94-4165-b80a-da9f96cf6fc3
Tags
attack.t1059.002 attack.t1059.007 attack.execution DEMO
Type
Community Rule

Rule History

Author
Title
Date
Commit
github-actions[bot]
Merge PR #4611 from @nasbench - Promote Older Rules Status From `experimental` To `test`
2023-12-01
Nasreddine Bencherchali
Merge PR #4482 From @nasbench - Add New Automation Workflows
2023-10-18
Nasreddine Bencherchali
fix: filename
2023-01-31
Nasreddine Bencherchali
fix: order fields and optimize selection
2023-01-31
D4rkCiph3r
Update proc_creation_macos_jxa_in-memory_execution.yml
2023-01-31
D4rkCiph3r
Update proc_creation_macos_jxa_in-memory_execution.yml
2023-01-31
D4rkCiph3r
Create proc_creation_macos_jxa_in-memory_execution.yml
2023-01-31