AppleScript executed a shell script

Cortex XSIAM Analytics Alert Reference by Alert name

Product
Cortex XSIAM
Last date published
2025-03-17
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

Detector Tags

AppleScript Analytics

ATT&CK Tactic

Execution (TA0002)

ATT&CK Technique

Severity

Informational

Description

An uncommon shell script has been executed by the AppleScript interpreter process.

Attacker's Goals

Use the AppleScript interpreter to execute a second stage payload.

Investigative actions

  • Analyze both the AppleScript and executed shell script to determine whether they perform malicious actions.
  • Check the events generated by the process or its children for potential malicious behavior.
  • Check whether the script was executed in an unusual way.

Variations

AppleScript executed a shell script using an unsigned, globally rare causality actor

Synopsis

ATT&CK Tactic

Execution (TA0002)

ATT&CK Technique

Severity

Low

Description

An uncommon shell script has been executed by the AppleScript interpreter process.

Attacker's Goals

Use the AppleScript interpreter to execute a second stage payload.

Investigative actions

  • Analyze both the AppleScript and executed shell script to determine whether they perform malicious actions.
  • Check the events generated by the process or its children for potential malicious behavior.
  • Check whether the script was executed in an unusual way.


AppleScript executed a shell script using an uncommon shell process

Synopsis

ATT&CK Tactic

Execution (TA0002)

ATT&CK Technique

Severity

Low

Description

An uncommon shell script has been executed by the AppleScript interpreter process.

Attacker's Goals

Use the AppleScript interpreter to execute a second stage payload.

Investigative actions

  • Analyze both the AppleScript and executed shell script to determine whether they perform malicious actions.
  • Check the events generated by the process or its children for potential malicious behavior.
  • Check whether the script was executed in an unusual way.