Refers to an event where one process attempts to open another process, typically to inspect or manipulate its memory, access handles, or modify execution flow. Monitoring these access attempts can provide valuable insight into both benign and malicious behaviors, such as debugging, inter-process communication (IPC), or process injection.
Data Collection Measures:
ptrace, open, read, write).| Name | Channel |
|---|---|
| Apple TCC Logs | Microphone Access Events |
| auditd:SYSCALL | ptrace attach |
| auditd:SYSCALL | High frequency of accept(), read(), or SSL_read() syscalls tied to nginx/apache processes |
| auditd:SYSCALL | ptrace |
| auditd:SYSCALL | ptrace syscall or access to /proc/*/mem |
| auditd:SYSCALL | ACCESS |
| auditd:SYSCALL | execve, fork, mmap, ptrace |
| auditd:SYSCALL | ptrace or process_vm_readv |
| linux:osquery | Process State |
| linux:osquery | process_events |
| linux:syslog | syscalls (open, read, ioctl) on /dev/input or /proc/*/fd/* |
| macos:endpointsecurity | ES_EVENT_TYPE_NOTIFY_OPEN |
| macos:osquery | process_open |
| macos:osquery | unexpected memory inspection |
| macos:unifiedlog | ptrace or task_for_pid |
| macos:unifiedlog | Unexpected NSXPCConnection calls by non-Apple-signed or abnormal binaries |
| macos:unifiedlog | Unusual Mach port registration or access attempts between unrelated processes |
| macos:unifiedlog | subsystem=com.apple.security, library=libsystem_kernel.dylib |
| macos:unifiedlog | vm_read, task_for_pid, or file open to cookie databases |
| WinEventLog:Security | EventCode=4656 |
| WinEventLog:Sysmon | EventCode=10 |
| WinEventLog:Sysmon | EventCode=10, 7 |
| WinEventLog:Sysmon | EventCode=25 |