Detects execution of image viewers or PowerShell scripts accessing or decoding files with mismatched MIME headers or embedded script-like byte patterns; often correlated with suspicious parent-child process lineage and outbound connections.
| Data Component | Name | Channel |
|---|---|---|
| Process Creation (DC0032) | WinEventLog:Sysmon | EventCode=1 |
| Network Connection Creation (DC0082) | WinEventLog:Sysmon | EventCode=3 |
| File Access (DC0055) | WinEventLog:Security | EventCode=4663 |
| Field | Description |
|---|---|
| ParentProcessImage | Tune to identify image editors/viewers invoking script interpreters (e.g., `mspaint.exe` > `powershell.exe`) |
| MimeHeaderMismatchTolerance | Adjust tolerance for image file headers that do not match file extensions or content structure |
| TimeWindow | Define the temporal range to correlate decoding → execution → network beaconing |
Detects access to media files followed by execution of scripts (bash, Python, etc.) referencing those same files, or outbound traffic triggered shortly after file read. Correlates unusual use of tools like steghide, exiftool, or image libraries.
| Data Component | Name | Channel |
|---|---|---|
| File Access (DC0055) | auditd:SYSCALL | open |
| Process Creation (DC0032) | auditd:SYSCALL | execve |
| Network Connection Creation (DC0082) | auditd:SYSCALL | connect |
| Field | Description |
|---|---|
| MonitoredToolsList | Define the list of steganographic or image-parsing tools to alert on (e.g., `steghide`, `imagemagick`) |
| ScriptInterpreterMatch | Tune to detect script engines accessing media files (e.g., `python script.py image.png`) |
Detects manipulation of PNG, JPG, or GIF files by user-initiated scripts followed by script execution or exfiltration behavior, especially from osascript, python, or bash, in combination with LaunchAgent persistence or curl activity.
| Data Component | Name | Channel |
|---|---|---|
| File Access (DC0055) | macos:osquery | file_events |
| Process Creation (DC0032) | macos:osquery | process_events |
| Network Connection Creation (DC0082) | macos:unifiedlog | network connection events |
| Field | Description |
|---|---|
| StegoToolNamePatterns | Adapt to known or emerging tools using stego methods on macOS (e.g., `Invoke-PSImage`, `stegsolve`) |
| ParentScriptSources | Update list of trusted versus unknown scripting hosts launching activity tied to image handling |