diff --git a/rules/credential_access_lsass_memory_dumping.yml b/rules/credential_access_lsass_memory_dumping.yml index 068ca8baa..61310df03 100644 --- a/rules/credential_access_lsass_memory_dumping.yml +++ b/rules/credential_access_lsass_memory_dumping.yml @@ -1,6 +1,6 @@ name: LSASS memory dumping via legitimate or offensive tools id: 335795af-246b-483e-8657-09a30c102e63 -version: 1.0.4 +version: 1.2.0 description: | Detects an attempt to dump the LSAAS memory to the disk by employing legitimate tools such as procdump, Task Manager, Process Explorer or built-in Windows tools @@ -23,7 +23,7 @@ condition: > sequence maxspan 2m by ps.uuid - |open_process and + |open_process and ps.access.mask.names in ('ALL_ACCESS', 'CREATE_PROCESS', 'VM_READ', 'DUP_HANDLE') and evt.arg[exe] imatches '?:\\Windows\\System32\\lsass.exe' and ps.exe not imatches @@ -32,7 +32,7 @@ condition: > '?:\\ProgramData\\Microsoft\\Windows Defender\\*\\MsMpEng.exe' ) | - |write_minidump_file| + |create_file and (file.extension iin ('.dmp', '.mdmp', '.dump') or is_minidump(file.path))| output: > Detected an attempt by `%1.ps.name` process to access and read diff --git a/rules/macros/macros.yml b/rules/macros/macros.yml index ea4558d0a..9346a0c28 100644 --- a/rules/macros/macros.yml +++ b/rules/macros/macros.yml @@ -204,25 +204,6 @@ description: > Detects when either unsigned or untrusted DLL is loaded into process address space. -- macro: write_minidump_file - expr: > - create_file and - ( - file.extension iin - ( - '.dmp', - '.mdmp', - '.dump' - ) or - is_minidump(file.path) - ) - description: | - Detects a process writing the minidump file. Minidump files are used for crash - reporting as they contain a snapshot of the process' memory such as local variables - or heap objects. Processes can create minidump files by calling into the MiniDumpWriteDump() - function. This macro checks the well-known extensions of the minidump files as well as - the minidump signature. - - macro: msoffice_binaries list: [EXCEL.EXE, WINWORD.EXE, MSACCESS.EXE, POWERPNT.EXE, visio.exe, mspub.exe, fltldr.exe, eqnedt32.exe]