Skip to content

Commit 5db6201

Browse files
committed
feat(rules): LSASS access from unsigned executable
Detects attempts by an unsigned process to access the Local Security Authority Subsystem Service (LSASS). Adversaries may try to dump credential information stored in the process memory of LSASS.
1 parent 3df8f30 commit 5db6201

File tree

2 files changed

+38
-0
lines changed

2 files changed

+38
-0
lines changed
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
name: LSASS access from unsigned executable
2+
id: 348bf896-2201-444f-b1c9-e957a1f063bf
3+
version: 1.0.0
4+
description: |
5+
Detects attempts by an unsigned process to access the Local Security Authority Subsystem Service (LSASS).
6+
Adversaries may try to dump credential information stored in the process memory of LSASS.
7+
labels:
8+
tactic.id: TA0006
9+
tactic.name: Credential Access
10+
tactic.ref: https://attack.mitre.org/tactics/TA0006/
11+
technique.name: OS Credential Dumping
12+
technique.ref: https://attack.mitre.org/techniques/T1003/
13+
subtechnique.id: T1003.001
14+
subtechnique.name: LSASS Memory
15+
subtechnique.ref: https://attack.mitre.org/techniques/T1003/001/
16+
references:
17+
- https://redcanary.com/threat-detection-report/techniques/lsass-memory/
18+
19+
condition: >
20+
sequence
21+
maxspan 7m
22+
by ps.uuid
23+
|load_unsigned_executable|
24+
|((open_process) or (open_thread)) and kevt.arg[exe] imatches '?:\\Windows\\System32\\lsass.exe'|
25+
action:
26+
- name: kill
27+
28+
output: >
29+
Unsigned executable %1.image.path attempted to access Local Security Authority Subsystem Service
30+
severity: high
31+
32+
min-engine-version: 2.2.0

rules/macros/macros.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -150,6 +150,12 @@
150150
expr: >
151151
load_module and (image.name iendswith '.dll' or image.is_dll)
152152
153+
- macro: load_unsigned_executable
154+
expr: >
155+
load_executable
156+
and
157+
image.signature.type = 'NONE'
158+
153159
- macro: load_untrusted_executable
154160
expr: >
155161
load_executable

0 commit comments

Comments
 (0)