AppleScript

From enterprise
Jump to: navigation, search
AppleScript
Technique
ID T1155
Tactic Execution, Lateral Movement
Platform MacOS, OS X
Permissions Required User
Data Sources API monitoring, System calls, Process Monitoring, Process command-line parameters
Supports Remote Yes

macOS and OS X applications send AppleEvent messages to each other for interprocess communications (IPC). These messages can be easily scripted with AppleScript for local or remote IPC. Osascript executes AppleScript and any other Open Scripting Architecture (OSA) language scripts. A list of OSA languages installed on a system can be found by using the osalang program. AppleEvent messages can be sent independently or as part of a script. These events can locate open windows, send keystrokes, and interact with almost any open application locally or remotely.

Adversaries can use this to interact with open SSH connection, move to remote machines, and even present users with fake dialog boxes. These events cannot start applications remotely (they can start them locally though), but can interact with applications if they're already running remotely. Since this is a scripting language, it can be used to launch more common techniques as well such as a reverse shell via python 1. Scripts can be run from the command lie via osascript /path/to/script or osascript -e "script here".

Mitigation

Require that all AppleScript be signed by a trusted developer ID before being executed - this will prevent random AppleScript code from executing.

Detection

Monitor for execution of AppleScript through osascript that may be related to other suspicious behavior occurring on the system.