Processes

Overview

Evidence: Processes Description: Collect Processes Category: System Platform: macos Short Name: process Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

Background

Process information provides a snapshot of all running processes on macOS, including command lines, parent-child relationships, and protection flags. This data is essential for understanding system activity, detecting malicious processes, and identifying unauthorized execution.

Data Collected

This collector gathers structured data about processes.

Processes Data

Field
Description
Example

ProcessId

Process Id

123

CSTime

CS Time

2023-10-15 14:30:25+03:00

StartTime

Start Time

2023-10-15 14:30:25+03:00

Command

Command

Example value

CommandLine

Command Line

Example value

State

State

Example value

SecureProcess

Secure Process

123

VirtualProcess

Virtual Process

123

ProtectionType

Protection Type

Example value

Cwd

Cwd

Example value

VirtualRootDir

Virtual Root Dir

Example value

Executable

Executable

Example value

IsExecutableExists

Is Executable Exists

true

Environment

Environment

Example value

LastChangeTime

Last Change Time

2023-10-15 14:30:25+03:00

AccessTime

Access Time

2023-10-15 14:30:25+03:00

ModificationTime

Modification Time

2023-10-15 14:30:25+03:00

SizeInBytes

Size In Bytes

123

Hash

Hash

Example value

ParentId

Parent Id

123

UserId

User Id

123

UserName

User Name

Example value

EffectiveUserId

Effective User Id

123

EffectiveUserName

Effective User Name

Example value

SavedUserId

Saved User Id

123

SavedUserName

Saved User Name

Example value

GroupId

Group Id

123

EffectiveGroupId

Effective Group Id

123

SavedGroupId

Saved Group Id

123

Threads

Threads

123

Nice

Nice

123

Collection Method

This collector parses the necessary data from the processes table via osquery.

Forensic Value

This evidence is crucial for forensic investigations as it reveals active applications and services, enabling detection of malware, process injection, backdoors, and persistence mechanisms.

Last updated

Was this helpful?