Skip to content

Commit 31fe23d

Browse files
committed
feat(rules): LSASS access from unsigned executable
Detects attempts by an unsigned process to access the Local Security Authority Subsystem Service (LSASS). Adversaries may try to dump credential information stored in the process memory of LSASS.
1 parent 6659103 commit 31fe23d

File tree

2 files changed

+38
-0
lines changed

2 files changed

+38
-0
lines changed
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
name: LSASS access from unsigned executable
2+
id: 348bf896-2201-444f-b1c9-e957a1f063bf
3+
version: 1.0.0
4+
description: |
5+
Detects attempts by an unsigned process to access the Local Security Authority Subsystem Service (LSASS).
6+
Adversaries may try to dump credential information stored in the process memory of LSASS.
7+
labels:
8+
tactic.id: TA0006
9+
tactic.name: Credential Access
10+
tactic.ref: https://attack.mitre.org/tactics/TA0006/
11+
technique.name: OS Credential Dumping
12+
technique.ref: https://attack.mitre.org/techniques/T1003/
13+
subtechnique.id: T1003.001
14+
subtechnique.name: LSASS Memory
15+
subtechnique.ref: https://attack.mitre.org/techniques/T1003/001/
16+
references:
17+
- https://redcanary.com/threat-detection-report/techniques/lsass-memory/
18+
19+
condition: >
20+
sequence
21+
maxspan 7m
22+
by ps.uuid
23+
|load_unsigned_executable|
24+
|((open_process) or (open_thread)) and kevt.arg[exe] imatches '?:\\Windows\\System32\\lsass.exe'|
25+
action:
26+
- name: kill
27+
28+
output: >
29+
Unsigned executable %1.image.path attempted to access Local Security Authority Subsystem Service
30+
severity: high
31+
32+
min-engine-version: 2.2.0

rules/macros/macros.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -153,6 +153,12 @@
153153
expr: >
154154
load_module and (image.name iendswith '.dll' or image.is_dll)
155155
156+
- macro: load_unsigned_executable
157+
expr: >
158+
load_executable
159+
and
160+
image.signature.type = 'NONE'
161+
156162
- macro: load_untrusted_executable
157163
expr: >
158164
load_executable

0 commit comments

Comments
 (0)