Synopsis
Description
The AppleScript interpreter process was executed with an uncommon command line.
Attacker's Goals
Perform various actions via AppleScript code, such as establishing persistence, evading detection, executing secondary payloads or injecting remote processes.
Investigative actions
- Analyze the command line and determine whether it performs any malicious/suspicious actions.
- Check the events generated by the process or its children for potential malicious behavior.
- Check whether the process was executed in an unusual way.
Variations
AppleScript process executed with a rare command line possibly using Finder to perform operations
Synopsis
Description
The AppleScript interpreter process was executed with an uncommon command line.
Attacker's Goals
Perform various actions via AppleScript code, such as establishing persistence, evading detection, executing secondary payloads or injecting remote processes.
Investigative actions
- Analyze the command line and determine whether it performs any malicious/suspicious actions.
- Check the events generated by the process or its children for potential malicious behavior.
- Check whether the process was executed in an unusual way.
AppleScript process executed with a rare command line with an unusual password prompt
Synopsis
Description
The AppleScript interpreter process was executed with an uncommon command line.
Attacker's Goals
Perform various actions via AppleScript code, such as establishing persistence, evading detection, executing secondary payloads or injecting remote processes.
Investigative actions
- Analyze the command line and determine whether it performs any malicious/suspicious actions.
- Check the events generated by the process or its children for potential malicious behavior.
- Check whether the process was executed in an unusual way.
AppleScript process executed with a rare command line that possibly injects JavaScript into a browser
Synopsis
Description
The AppleScript interpreter process was executed with an uncommon command line.
Attacker's Goals
Perform various actions via AppleScript code, such as establishing persistence, evading detection, executing secondary payloads or injecting remote processes.
Investigative actions
- Analyze the command line and determine whether it performs any malicious/suspicious actions.
- Check the events generated by the process or its children for potential malicious behavior.
- Check whether the process was executed in an unusual way.
AppleScript process executed with a rare command line that possibly establishes persistence
Synopsis
Description
The AppleScript interpreter process was executed with an uncommon command line.
Attacker's Goals
Perform various actions via AppleScript code, such as establishing persistence, evading detection, executing secondary payloads or injecting remote processes.
Investigative actions
- Analyze the command line and determine whether it performs any malicious/suspicious actions.
- Check the events generated by the process or its children for potential malicious behavior.
- Check whether the process was executed in an unusual way.
AppleScript process executed with a rare command line that possibly installs a proxy
Synopsis
Description
The AppleScript interpreter process was executed with an uncommon command line.
Attacker's Goals
Perform various actions via AppleScript code, such as establishing persistence, evading detection, executing secondary payloads or injecting remote processes.
Investigative actions
- Analyze the command line and determine whether it performs any malicious/suspicious actions.
- Check the events generated by the process or its children for potential malicious behavior.
- Check whether the process was executed in an unusual way.
AppleScript process executed with a rare command line performing clipboard access
Synopsis
Description
The AppleScript interpreter process was executed with an uncommon command line.
Attacker's Goals
Perform various actions via AppleScript code, such as establishing persistence, evading detection, executing secondary payloads or injecting remote processes.
Investigative actions
- Analyze the command line and determine whether it performs any malicious/suspicious actions.
- Check the events generated by the process or its children for potential malicious behavior.
- Check whether the process was executed in an unusual way.