119 lines
3.7 KiB
YAML
119 lines
3.7 KiB
YAML
title: Generic Password Dumper Activity on LSASS
|
|
author: Roberto Rodriguez, Teymur Kheirkhabarov, Dimitrios Slamaris, Mark Russinovich,
|
|
Aleksey Potapov, oscd.community (update)
|
|
date: 2019/11/01
|
|
description: Detects process handle on LSASS process with certain access mask
|
|
detection:
|
|
SELECTION_1:
|
|
ObjectName: '*\lsass.exe'
|
|
SELECTION_10:
|
|
AccessMask: '*0x143a*'
|
|
SELECTION_11:
|
|
AccessMask: '*0x1418*'
|
|
SELECTION_12:
|
|
AccessMask: '*0x1f0fff*'
|
|
SELECTION_13:
|
|
AccessMask: '*0x1f1fff*'
|
|
SELECTION_14:
|
|
AccessMask: '*0x1f2fff*'
|
|
SELECTION_15:
|
|
AccessMask: '*0x1f3fff*'
|
|
SELECTION_16:
|
|
EventID: 4663
|
|
SELECTION_17:
|
|
AccessList: '*4484*'
|
|
SELECTION_18:
|
|
AccessList: '*4416*'
|
|
SELECTION_19:
|
|
ProcessName: '*\wmiprvse.exe'
|
|
SELECTION_2:
|
|
EventID: 4656
|
|
SELECTION_20:
|
|
ProcessName: '*\taskmgr.exe'
|
|
SELECTION_21:
|
|
ProcessName: '*\procexp64.exe'
|
|
SELECTION_22:
|
|
ProcessName: '*\procexp.exe'
|
|
SELECTION_23:
|
|
ProcessName: '*\lsm.exe'
|
|
SELECTION_24:
|
|
ProcessName: '*\csrss.exe'
|
|
SELECTION_25:
|
|
ProcessName: '*\wininit.exe'
|
|
SELECTION_26:
|
|
ProcessName: '*\vmtoolsd.exe'
|
|
SELECTION_27:
|
|
ProcessName: '*\minionhost.exe'
|
|
SELECTION_28:
|
|
ProcessName: '*\VsTskMgr.exe'
|
|
SELECTION_29:
|
|
ProcessName: '*\thor64.exe'
|
|
SELECTION_3:
|
|
AccessMask: '*0x40*'
|
|
SELECTION_30:
|
|
ProcessName: '*\MicrosoftEdgeUpdate.exe'
|
|
SELECTION_31:
|
|
ProcessName: '*\GamingServices.exe'
|
|
SELECTION_32:
|
|
ProcessName: '*\svchost.exe'
|
|
SELECTION_33:
|
|
ProcessName: C:\Windows\System32\\*
|
|
SELECTION_34:
|
|
ProcessName: C:\Windows\SysWow64\\*
|
|
SELECTION_35:
|
|
ProcessName: C:\Windows\SysNative\\*
|
|
SELECTION_36:
|
|
ProcessName: C:\Program Files\\*
|
|
SELECTION_37:
|
|
ProcessName: C:\Windows\Temp\asgard2-agent\\*
|
|
SELECTION_38:
|
|
ProcessName: C:\Program Files*
|
|
SELECTION_4:
|
|
AccessMask: '*0x1400*'
|
|
SELECTION_5:
|
|
AccessMask: '*0x1000*'
|
|
SELECTION_6:
|
|
AccessMask: '*0x100000*'
|
|
SELECTION_7:
|
|
AccessMask: '*0x1410*'
|
|
SELECTION_8:
|
|
AccessMask: '*0x1010*'
|
|
SELECTION_9:
|
|
AccessMask: '*0x1438*'
|
|
condition: (((SELECTION_1 and ((SELECTION_2 and (SELECTION_3 or SELECTION_4 or
|
|
SELECTION_5 or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or
|
|
SELECTION_10 or SELECTION_11 or SELECTION_12 or SELECTION_13 or SELECTION_14
|
|
or SELECTION_15)) or (SELECTION_16 and (SELECTION_17 or SELECTION_18)))) and not
|
|
((SELECTION_19 or SELECTION_20 or SELECTION_21 or SELECTION_22 or SELECTION_23
|
|
or SELECTION_24 or SELECTION_25 or SELECTION_26 or SELECTION_27 or SELECTION_28
|
|
or SELECTION_29 or SELECTION_30 or SELECTION_31 or SELECTION_32) and (SELECTION_33
|
|
or SELECTION_34 or SELECTION_35 or SELECTION_36 or SELECTION_37))) and not
|
|
((SELECTION_38)))
|
|
falsepositives:
|
|
- Legitimate software accessing LSASS process for legitimate reason; update the whitelist
|
|
with it
|
|
fields:
|
|
- ComputerName
|
|
- SubjectDomainName
|
|
- SubjectUserName
|
|
- ProcessName
|
|
- ProcessID
|
|
id: 4a1b6da0-d94f-4fc3-98fc-2d9cb9e5ee76
|
|
level: high
|
|
logsource:
|
|
product: windows
|
|
service: security
|
|
modified: 2021/11/09
|
|
references:
|
|
- https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html
|
|
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
|
|
status: experimental
|
|
tags:
|
|
- attack.credential_access
|
|
- attack.t1003
|
|
- car.2019-04-004
|
|
- attack.t1003.001
|
|
yml_filename: win_susp_lsass_dump_generic.yml
|
|
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/builtin
|
|
|