Lazagne dumping credentials
Detects the use of lazagne using command line execution.
Sigma rule (View on GitHub)
1title: Lazagne dumping credentials
2id: ce435e85-f322-494c-b11d-7f03201e7da7
3status: experimental
4description: Detects the use of lazagne using command line execution.
5author: 'Kostastsale, TheDFIRReport'
6references:
7- https://thedfirreport.com/2022/05/09/seo-poisoning-a-gootloader-story/
8- https://github.com/AlessandroZ/LaZagne/blob/master/Windows/lazagne/config/execute_cmd.py
9date: 2022-05-09
10modified: 2024-02-23
11logsource:
12 product: windows
13 category: process_creation
14detection:
15 selection1:
16 Image|endswith:
17 - '\cmd.exe'
18 - '\powershell.exe'
19 CommandLine|contains|all:
20 - '/c'
21 - 'reg.exe'
22 - 'save'
23 ParentCommandLine|contains:
24 - 'all'
25 selection2:
26 ParentCommandLine|contains:
27 - '-oN'
28 - '-oA'
29 - '-oJ'
30 - '-quiet'
31 - '-output'
32 CommandLine|contains:
33 - 'hklm\system'
34 - 'hklm\security'
35 - 'hklm\sam'
36 modules:
37 Image|endswith:
38 - '\lazagne.exe'
39 CommandLine|contains:
40 - 'browsers'
41 - 'chats'
42 - 'databases'
43 - 'games'
44 - 'memory'
45 - 'git'
46 - 'maven'
47 - 'sysadmin'
48 - 'php'
49 - 'svn'
50 - 'multimedia'
51 condition: (selection1 and selection2) or modules
52falsepositives:
53 - Unknown
54level: high
55tags:
56 - attack.credential_access
57 - attack.t1555
References
Related rules
- Stored Credentials in Fake Files
- Adding, Listing and Removing Credentials via Cmdkey CommandLine Ultility
- Possible Impacket Secretsdump.py Activity
- Abnormal LSASS Child and Parent Process Relationships (RedCanary Threat Detection Report)
- Abnormal LSASS Process Access and Injection (RedCanary Threat Detection Report)