Credential Dumping Attempt Via WerFault
Detects process LSASS memory dump using Mimikatz, NanoDump, Invoke-Mimikatz, Procdump or Taskmgr based on the CallTrace pointing to ntdll.dll, dbghelp.dll or dbgcore.dll for win10, server2016 and up.
Sigma rule (View on GitHub)
1title: Credential Dumping Attempt Via WerFault
2id: e5b33f7d-eb93-48b6-9851-09e1e610b6d7
3status: test
4description: Detects process LSASS memory dump using Mimikatz, NanoDump, Invoke-Mimikatz, Procdump or Taskmgr based on the CallTrace pointing to ntdll.dll, dbghelp.dll or dbgcore.dll for win10, server2016 and up.
5references:
6 - https://github.com/helpsystems/nanodump/commit/578116faea3d278d53d70ea932e2bbfe42569507
7author: Florian Roth (Nextron Systems)
8date: 2012-06-27
9modified: 2023-11-29
10tags:
11 - attack.credential-access
12 - attack.t1003.001
13 - attack.s0002
14logsource:
15 category: process_access
16 product: windows
17detection:
18 selection:
19 SourceImage|endswith: '\WerFault.exe'
20 TargetImage|endswith: '\lsass.exe'
21 GrantedAccess: '0x1FFFFF'
22 condition: selection
23falsepositives:
24 - Actual failures in lsass.exe that trigger a crash dump (unlikely)
25 - Unknown cases in which WerFault accesses lsass.exe
26level: high
References
Related rules
- LSASS Access From Potentially White-Listed Processes
- LSASS Memory Access by Tool With Dump Keyword In Name
- Mimikatz Use
- Potential Credential Dumping Activity Via LSASS
- Remote LSASS Process Access Through Windows Remote Management