File tree Expand file tree Collapse file tree 1 file changed +33
-0
lines changed
Expand file tree Collapse file tree 1 file changed +33
-0
lines changed Original file line number Diff line number Diff line change 1+ name : LSASS memory dump via MiniDumpWriteDump
2+ id : fd7ced77-4a95-4658-80f6-6b9d7b5e3777
3+ version : 1.0.0
4+ description : |
5+ Identifies access to the Local Security Authority Subsystem Service (LSASS) process to dump the
6+ memory via MiniDumpWriteDump API.
7+ labels :
8+ tactic.id : TA0006
9+ tactic.name : Credential Access
10+ tactic.ref : https://attack.mitre.org/tactics/TA0006/
11+ technique.id : T1003
12+ technique.name : OS Credential Dumping
13+ technique.ref : https://attack.mitre.org/techniques/T1003/
14+ subtechnique.id : T1003.001
15+ subtechnique.name : LSASS Memory
16+ subtechnique.ref : https://attack.mitre.org/techniques/T1003/001/
17+ references :
18+ - https://redcanary.com/threat-detection-report/techniques/lsass-memory/
19+ - https://modexp.wordpress.com/2019/08/30/minidumpwritedump-via-com-services-dll/
20+ - https://www.ired.team/offensive-security/credential-access-and-credential-dumping/dumping-lsass-passwords-without-mimikatz-minidumpwritedump-av-signature-bypass
21+
22+ condition : >
23+ ((open_process) or (open_thread)) and kevt.arg[exe] imatches '?:\\Windows\\System32\\lsass.exe'
24+ and
25+ (thread.callstack.modules imatches ('*dbgcore.dll', '*comsvcs.dll') or thread.callstack.symbols imatches ('*MiniDumpWriteDump'))
26+ action :
27+ - name : kill
28+
29+ output : >
30+ LSASS memory dump attempt by process %ps.exe via MiniDumpWriteDump
31+ severity : high
32+
33+ min-engine-version : 2.4.0
You can’t perform that action at this time.
0 commit comments