Skip to content

Commit 328f7be

Browse files
committed
feat(rules): Add LSASS memory dump via MiniDumpWriteDump rule
Identifies access to the Local Security Authority Subsystem Service (LSASS) process to dump the memory via MiniDumpWriteDump API.
1 parent 0a08b8c commit 328f7be

File tree

1 file changed

+33
-0
lines changed

1 file changed

+33
-0
lines changed
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
name: LSASS memory dump via MiniDumpWriteDump
2+
id: fd7ced77-4a95-4658-80f6-6b9d7b5e3777
3+
version: 1.0.0
4+
description: |
5+
Identifies access to the Local Security Authority Subsystem Service (LSASS) process to dump the
6+
memory via MiniDumpWriteDump API.
7+
labels:
8+
tactic.id: TA0006
9+
tactic.name: Credential Access
10+
tactic.ref: https://attack.mitre.org/tactics/TA0006/
11+
technique.id: T1003
12+
technique.name: OS Credential Dumping
13+
technique.ref: https://attack.mitre.org/techniques/T1003/
14+
subtechnique.id: T1003.001
15+
subtechnique.name: LSASS Memory
16+
subtechnique.ref: https://attack.mitre.org/techniques/T1003/001/
17+
references:
18+
- https://redcanary.com/threat-detection-report/techniques/lsass-memory/
19+
- https://modexp.wordpress.com/2019/08/30/minidumpwritedump-via-com-services-dll/
20+
- https://www.ired.team/offensive-security/credential-access-and-credential-dumping/dumping-lsass-passwords-without-mimikatz-minidumpwritedump-av-signature-bypass
21+
22+
condition: >
23+
((open_process) or (open_thread)) and kevt.arg[exe] imatches '?:\\Windows\\System32\\lsass.exe'
24+
and
25+
(thread.callstack.modules imatches ('*dbgcore.dll', '*comsvcs.dll') or thread.callstack.symbols imatches ('*MiniDumpWriteDump'))
26+
action:
27+
- name: kill
28+
29+
output: >
30+
LSASS memory dump attempt by process %ps.exe via MiniDumpWriteDump
31+
severity: high
32+
33+
min-engine-version: 2.4.0

0 commit comments

Comments
 (0)