Potentially Suspicious AccessMask Requested From LSASS
Detects process handle on LSASS process with certain access mask
Sigma rule (View on GitHub)
1title: Potentially Suspicious AccessMask Requested From LSASS
2id: 4a1b6da0-d94f-4fc3-98fc-2d9cb9e5ee76
3status: test
4description: Detects process handle on LSASS process with certain access mask
5references:
6 - https://web.archive.org/web/20230208123920/https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html
7 - https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
8author: Roberto Rodriguez, Teymur Kheirkhabarov, Dimitrios Slamaris, Mark Russinovich, Aleksey Potapov, oscd.community (update)
9date: 2019-11-01
10modified: 2023-12-19
11tags:
12 - attack.credential-access
13 - car.2019-04-004
14 - attack.t1003.001
15logsource:
16 product: windows
17 service: security
18detection:
19 selection_1:
20 EventID: 4656 # A handle to an object was requested.
21 ObjectName|endswith: '\lsass.exe'
22 AccessMask|contains:
23 - '0x40'
24 - '0x1400'
25 # - '0x1000' # minimum access requirements to query basic info from service
26 - '0x100000'
27 - '0x1410' # car.2019-04-004
28 - '0x1010' # car.2019-04-004
29 - '0x1438' # car.2019-04-004
30 - '0x143a' # car.2019-04-004
31 - '0x1418' # car.2019-04-004
32 - '0x1f0fff'
33 - '0x1f1fff'
34 - '0x1f2fff'
35 - '0x1f3fff'
36 selection_2:
37 EventID: 4663 # An attempt was made to access an object
38 ObjectName|endswith: '\lsass.exe'
39 AccessList|contains:
40 - '4484'
41 - '4416'
42 filter_main_specific:
43 ProcessName|endswith:
44 - '\csrss.exe'
45 - '\GamingServices.exe'
46 - '\lsm.exe'
47 - '\MicrosoftEdgeUpdate.exe'
48 - '\minionhost.exe' # Cyberreason
49 - '\MRT.exe' # MS Malware Removal Tool
50 - '\MsMpEng.exe' # Defender
51 - '\perfmon.exe'
52 - '\procexp.exe'
53 - '\procexp64.exe'
54 - '\svchost.exe'
55 - '\taskmgr.exe'
56 - '\thor.exe' # THOR
57 - '\thor64.exe' # THOR
58 - '\vmtoolsd.exe'
59 - '\VsTskMgr.exe' # McAfee Enterprise
60 - '\wininit.exe'
61 - '\wmiprvse.exe'
62 - 'RtkAudUService64' # https://medium.com/falconforce/the-curious-case-of-realtek-and-lsass-33fc0c8482ff
63 ProcessName|contains:
64 - ':\Program Files (x86)\'
65 - ':\Program Files\'
66 - ':\ProgramData\Microsoft\Windows Defender\Platform\'
67 - ':\Windows\SysNative\'
68 - ':\Windows\System32\'
69 - ':\Windows\SysWow64\'
70 - ':\Windows\Temp\asgard2-agent\'
71 filter_main_generic:
72 ProcessName|contains: ':\Program Files' # too many false positives with legitimate AV and EDR solutions
73 filter_main_exact:
74 ProcessName|endswith:
75 - ':\Windows\System32\taskhostw.exe'
76 - ':\Windows\System32\msiexec.exe'
77 - ':\Windows\CCM\CcmExec.exe'
78 filter_main_sysmon:
79 ProcessName|endswith: ':\Windows\Sysmon64.exe'
80 AccessList|contains: '%%4484'
81 filter_main_aurora:
82 ProcessName|contains: ':\Windows\Temp\asgard2-agent-sc\aurora\'
83 ProcessName|endswith: '\aurora-agent-64.exe'
84 AccessList|contains: '%%4484'
85 filter_main_scenarioengine:
86 # Example: C:\a70de9569c3a5aa22184ef52a890177b\x64\SCENARIOENGINE.EXE
87 ProcessName|endswith: '\x64\SCENARIOENGINE.EXE'
88 AccessList|contains: '%%4484'
89 filter_main_avira1:
90 ProcessName|contains|all:
91 - ':\Users\'
92 - '\AppData\Local\Temp\is-'
93 ProcessName|endswith: '\avira_system_speedup.tmp'
94 AccessList|contains: '%%4484'
95 filter_main_avira2:
96 ProcessName|contains: ':\Windows\Temp\'
97 ProcessName|endswith: '\avira_speedup_setup_update.tmp'
98 AccessList|contains: '%%4484'
99 filter_main_snmp:
100 ProcessName|endswith: ':\Windows\System32\snmp.exe'
101 AccessList|contains: '%%4484'
102 filter_main_googleupdate:
103 ProcessName|contains: ':\Windows\SystemTemp\'
104 ProcessName|endswith: '\GoogleUpdate.exe'
105 AccessList|contains: '%%4484'
106 filter_optional_procmon:
107 ProcessName|endswith:
108 - '\procmon64.exe'
109 - '\procmon.exe'
110 AccessList|contains: '%%4484'
111 condition: 1 of selection_* and not 1 of filter_main_* and not 1 of filter_optional_*
112falsepositives:
113 - Legitimate software accessing LSASS process for legitimate reason; update the whitelist with it
114level: medium
References
Related rules
- Mimikatz Use
- LSASS Process Memory Dump Files
- HackTool - Generic Process Access
- Potentially Suspicious GrantedAccess Flags On LSASS
- LSASS Process Memory Dump Creation Via Taskmgr.EXE