Using Lazagne to dump credentials

Detects the use of lazagne looking into the command line execution.

Sigma rule (View on GitHub)

 1title: Using Lazagne to dump credentials
 2id: 29419560-7c08-46d4-bb2c-531ed2ea0383
 3status: Experimental
 4description: Detects the use of lazagne looking into the command line execution.
 5author: \@Kostastsale, \@TheDFIRReport
 6references: 
 7  - https://thedfirreport.com/2022/05/09/seo-poisoning-a-gootloader-story/
 8  - https://github.com/AlessandroZ/LaZagne/blob/master/Windows/lazagne/config/execute_cmd.py
 9date: 2022/05/09
10logsource:
11  product: windows
12  category: process_creation
13detection:
14  selection1:
15    Image|endswith: 
16      - '\cmd.exe'
17      - '\powershell.exe'
18    CommandLine|contains|all:
19      - '/c'
20      - 'reg.exe'
21      - 'save'
22    ParentCommandLine|contains:
23      - 'all'
24  selection2:
25    ParentCommandLine|contains:
26      - '-oN'
27      - '-oA'
28      - '-oJ'
29      - '-quiet'
30      - '-output'
31    CommandLine|contains:
32      - 'hklm\system'
33      - 'hklm\security'
34      - 'hklm\sam'
35  modules:
36    Image|endswith:
37      - '\lazagne.exe'
38    CommandLine|contains:
39      - 'browsers'
40      - 'chats'
41      - 'databases'
42      - 'games'
43      - 'memory'
44      - 'git'
45      - 'maven'
46      - 'sysadmin'
47      - 'php'
48      - 'svn'
49      - 'multimedia'
50  condition: (selection1 and selection2) or modules
51falsepositives:
52  - Uknown
53level: high
54tags:
55- attack.credential_access
56- attack.t1555```

References

Related rules

to-top