LSASS Memory Access by Tool With Dump Keyword In Name

Detects LSASS process access requests from a source process with the "dump" keyword in its image name.

Sigma rule (View on GitHub)

 1title: LSASS Memory Access by Tool With Dump Keyword In Name
 2id: 9bd012ee-0dff-44d7-84a0-aa698cfd87a3
 3status: test
 4description: Detects LSASS process access requests from a source process with the "dump" keyword in its image name.
 5references:
 6    - https://twitter.com/_xpn_/status/1491557187168178176
 7    - https://www.ired.team/offensive-security/credential-access-and-credential-dumping/dump-credentials-from-lsass-process-without-mimikatz
 8author: Florian Roth (Nextron Systems)
 9date: 2022/02/10
10modified: 2023/11/29
11tags:
12    - attack.credential_access
13    - attack.t1003.001
14    - attack.s0002
15logsource:
16    category: process_access
17    product: windows
18detection:
19    selection:
20        TargetImage|endswith: '\lsass.exe'
21        SourceImage|contains: 'dump'
22        GrantedAccess|endswith:
23            - '10'
24            - '30'
25            - '50'
26            - '70'
27            - '90'
28            - 'B0'
29            - 'D0'
30            - 'F0'
31            - '18'
32            - '38'
33            - '58'
34            - '78'
35            - '98'
36            - 'B8'
37            - 'D8'
38            - 'F8'
39            - '1A'
40            - '3A'
41            - '5A'
42            - '7A'
43            - '9A'
44            - 'BA'
45            - 'DA'
46            - 'FA'
47            - '0x14C2'  # https://github.com/b4rtik/ATPMiniDump/blob/76304f93b390af3bb66e4f451ca16562a479bdc9/ATPMiniDump/ATPMiniDump.c
48            - 'FF'
49    condition: selection
50falsepositives:
51    - Rare programs that contain the word dump in their name and access lsass
52level: high

References

Related rules

to-top