T1222.002

Linux and Mac File and Directory Permissions Modification

Adversaries modify file or directory permissions on Linux and macOS systems using chmod, chown, and chattr to evade access controls and enable further malicious activity. Common patterns include chmod +x or chmod 777 on payloads dropped in world-writable directories (/tmp, /dev/shm, /var/tmp), chattr +i to make persistence mechanisms immutable and undeletable, setuid bit setting (chmod 4755/+s) for privilege escalation, and chown root to escalate file ownership. Threat actors including TeamTNT, Rocke, Kinsing, APT32, and Black Basta have all leveraged these commands to prepare and protect malicious binaries. This technique frequently precedes or accompanies persistence (T1546.004 shell config modification, T1574 hijack execution flow) and execution techniques.

Microsoft Sentinel / Defender
kusto
let SuspiciousTargetPaths = dynamic(["/tmp/", "/dev/shm/", "/var/tmp/", "/run/", "/etc/cron", "/etc/init", "/etc/systemd/", ".bashrc", ".bash_profile", ".bash_logout", ".profile", ".ssh/", "/etc/passwd", "/etc/shadow", "/etc/sudoers", "/usr/local/bin/", "/usr/bin/"]);
let SuspiciousChmodModes = dynamic(["777", "4755", "4777", "6755", "6777", "7777", "+s", "a+x", "a+w", "o+w", "o+x"]);
let SuspiciousParents = dynamic(["python", "python3", "perl", "ruby", "php", "node", "nginx", "apache2", "httpd", "lighttpd", "curl", "wget", "sh", "bash", "dash"]);
DeviceProcessEvents
| where Timestamp > ago(24h)
| where OSPlatform in~ ("Linux", "macOS")
| where FileName in~ ("chmod", "chown", "chattr", "setfacl")
| extend ChmodSuid = ProcessCommandLine has_any (["4755", "4777", "6755", "6777", "+s"])
| extend ChmodWorldWritable = ProcessCommandLine has_any (["777", "a+w", "o+w", "0777"])
| extend ChmodExecutable = ProcessCommandLine has_any (["+x", "755", "a+x", "o+x"]) and ProcessCommandLine has_any(SuspiciousTargetPaths)
| extend ChattrImmutable = FileName =~ "chattr" and ProcessCommandLine has "+i"
| extend ChattrUnlock = FileName =~ "chattr" and ProcessCommandLine has "-i"
| extend ChownToRoot = FileName =~ "chown" and ProcessCommandLine has_any (["root:", ":root", " 0 ", " 0:", ":0 ", "root "])
| extend SuspiciousTarget = ProcessCommandLine has_any (SuspiciousTargetPaths)
| extend SuspiciousParent = InitiatingProcessFileName has_any (SuspiciousParents)
| extend RecursiveChange = ProcessCommandLine has_any (["-R ", "--recursive"])
| where ChmodSuid or ChmodWorldWritable or ChmodExecutable or ChattrImmutable or ChattrUnlock or ChownToRoot or (SuspiciousTarget and SuspiciousParent)
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
         InitiatingProcessFileName, InitiatingProcessCommandLine,
         ChmodSuid, ChmodWorldWritable, ChmodExecutable,
         ChattrImmutable, ChattrUnlock, ChownToRoot,
         SuspiciousTarget, SuspiciousParent, RecursiveChange
| sort by Timestamp desc
medium severity high confidence

Data Sources

Process: Process Creation Command: Command Execution Microsoft Defender for Endpoint (Linux/macOS agent)

Required Tables

DeviceProcessEvents

False Positives

  • Software package managers (apt, yum, dnf, brew) applying permissions during installation or upgrade
  • CI/CD pipelines (Jenkins, GitLab Runner, GitHub Actions self-hosted) making scripts executable as part of build steps
  • System administrators using chmod +x on deployment scripts or configuration files
  • Container entrypoint scripts that set file permissions during container initialization
  • Backup and restore operations using chown to restore original file ownership
  • Developer workstations where users frequently adjust file permissions for local development

Unlock Pro Content

Get the full detection package for T1222.002 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections