Processes

Overview

Evidence: Processes Description: Collect Processes Category: System Platform: macOS Short Name: process Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

Background

Process information provides a snapshot of all running processes on the system, including their command lines, parent-child relationships, and resource usage. This data is essential for understanding system activity, detecting malicious processes, and identifying unauthorized software execution.

Process data helps investigators understand what applications and services were running at the time of collection, identify suspicious or malicious processes, and trace the execution flow of potentially harmful software.

Data Collected

This collector gathers structured data about processes.

Processes Data

Field
Description
Example

ID

Primary key (auto-increment)

1

ProcessId

Process ID

1234

CSTime

CPU system time

2023-10-15 14:30:25

StartTime

Process start time

2023-10-15 14:30:25

Command

Process name

Safari

CommandLine

Full command line

/Applications/Safari.app/Contents/MacOS/Safari

State

Process state

running

SecureProcess

Secure process flag

1

VirtualProcess

Virtual process flag

0

ProtectionType

Process protection type

none

Cwd

Current working directory

/Users/john

VirtualRootDir

Virtual root directory

/

Executable

Executable path

/Applications/Safari.app/Contents/MacOS/Safari

IsExecutableExists

Whether executable exists

true

Environment

Environment variables (JSON)

["PATH=/usr/bin", "HOME=/Users/john"]

LastChangeTime

Last change time

2023-10-15 14:30:25

AccessTime

Access time

2023-10-15 14:30:25

ModificationTime

Modification time

2023-10-15 14:30:25

SizeInBytes

Executable size in bytes

1048576

Hash

Executable SHA-256 hash

a1b2c3d4e5f6...

ParentId

Parent process ID

1

UserId

User ID

501

UserName

Username

john

EffectiveUserId

Effective user ID

501

EffectiveUserName

Effective username

john

SavedUserId

Saved user ID

501

SavedUserName

Saved username

john

GroupId

Group ID

20

EffectiveGroupId

Effective group ID

20

SavedGroupId

Saved group ID

20

Threads

Number of threads

8

Nice

Process nice value

0

Collection Method

This collector parses the necessary data from the processes table.

Usage

Why This Evidence Matters for Forensics

Process information is fundamental to understanding system activity and detecting malicious behavior. It provides visibility into what applications and services were running, helping investigators identify unauthorized processes, malware, and suspicious system activity.

Investigative Questions This Evidence Can Answer:

  • What processes were running at the time of collection?

  • Which applications or services were active during an incident?

  • Are there any suspicious or unauthorized processes running?

Attack Detection:

  • Malicious processes and malware execution (MITRE ATT&CK T1055)

  • Unauthorized software and backdoors

  • Process injection and privilege escalation techniques

Incident Response Applications:

  • Identify active threats and malicious processes

  • Understand system state during an incident

  • Track process execution and system activity

Threat Hunting:

  • Hunt for suspicious process names and command lines

  • Detect processes with unusual resource usage

  • Identify unauthorized or unknown applications

Compliance & Security Posture:

  • Audit running applications for policy compliance

  • Monitor for unauthorized software execution

  • Verify system security and application whitelisting

Notes

This data may contain sensitive information that should be handled according to data protection requirements. Ensure proper chain of custody is maintained during collection and analysis.

Last updated

Was this helpful?