Skip to content
Threat Feed
medium advisory

LSASS Loading Suspicious DLL

Detection of LSASS loading an unsigned or untrusted DLL, which can indicate credential access attempts by malicious actors targeting sensitive information stored in the LSASS process.

The Local Security Authority Subsystem Service (LSASS) is a critical Windows component that manages security policies and user authentication. Attackers often target LSASS to dump credentials, using techniques like injecting malicious DLLs. This detection focuses on identifying instances where LSASS loads a DLL that is either unsigned or not signed by a trusted vendor. The rule excludes known legitimate signatures and file hashes to reduce false positives. This activity is a strong indicator of credential access attempts, potentially leading to further compromise of the system and network. The signatures identified in the rule contain well-known software vendors like Microsoft, McAfee and Citrix.

Attack Chain

  1. An attacker gains initial access to the system through various means (e.g., phishing, exploiting a vulnerability).
  2. The attacker elevates privileges to gain sufficient access to interact with the LSASS process.
  3. The attacker drops a malicious DLL onto the system, often disguised as a legitimate file.
  4. The attacker injects the malicious DLL into the LSASS process using techniques like Reflective DLL Injection.
  5. LSASS loads the injected DLL, granting the attacker access to sensitive credentials stored in memory.
  6. The malicious DLL dumps credentials, such as plaintext passwords or NTLM hashes.
  7. The attacker uses the stolen credentials for lateral movement to other systems on the network.
  8. The attacker achieves their final objective, such as data exfiltration or deploying ransomware.

Impact

Successful exploitation leads to credential compromise, allowing attackers to move laterally within the network, access sensitive data, and potentially achieve complete domain dominance. This can result in data breaches, financial losses, and reputational damage. The impact depends on the level of access associated with the compromised credentials.

Recommendation

  • Deploy the LSASS Loading Untrusted DLL Sigma rule to your SIEM to detect suspicious DLLs loaded by LSASS.
  • Investigate any alerts generated by the Sigma rule and review the loaded DLL’s code signature and hash.
  • Block the identified SHA256 hashes listed in the IOC table to prevent the execution of known malicious DLLs.
  • Implement application whitelisting to restrict which DLLs can be loaded into LSASS.
  • Enable Sysmon process creation and image load logging to provide the necessary data for detection.

Detection coverage 2

LSASS Loading Untrusted DLL

medium

Detects LSASS loading a DLL that is not signed by a trusted vendor or has a known bad hash, indicating potential credential dumping activity.

sigma tactics: credential_access techniques: T1003.001 sources: image_load, windows

LSASS Loading DLL with Expired Signature

low

Detects LSASS loading a DLL with an expired signature, which may indicate a compromised or outdated component.

sigma tactics: credential_access techniques: T1003.001 sources: image_load, windows

Detection queries are kept inside the platform. Get full rules →

Indicators of compromise

9

hash_sha256

TypeValue
hash_sha256811a03a5d7c03802676d2613d741be690b3461022ea925eb6b2651a5be740a4c
hash_sha2561181542d9cfd63fb00c76242567446513e6773ea37db6211545629ba2ecf26a1
hash_sha256ed6e735aa6233ed262f50f67585949712f1622751035db256811b4088c214ce3
hash_sha25626be2e4383728eebe191c0ab19706188f0e9592add2e0bf86b37442083ae5e12
hash_sha2569367e78b84ef30cf38ab27776605f2645e52e3f6e93369c674972b668a444faa
hash_sha256d46cc934765c5ecd53867070f540e8d6f7701e834831c51c2b0552aba871921b
hash_sha2560f77a3826d7a5cd0533990be0269d951a88a5c277bc47cff94553330b715ec61
hash_sha2564aca034d3d85a9e9127b5d7a10882c2ef4c3e0daa3329ae2ac1d0797398695fb
hash_sha25686031e69914d9d33c34c2f4ac4ae523cef855254d411f88ac26684265c981d95