Suspicious Module Loaded by LSASS for Credential Access
Detection of unsigned or untrusted DLLs being loaded into the LSASS process, which is indicative of credential access attempts by adversaries aiming to steal sensitive information such as user passwords.
This rule detects the loading of unsigned or untrusted DLLs into the Local Security Authority Subsystem Service (LSASS) process on Windows systems. LSASS is a critical component responsible for managing security policies and handling user authentication, making it a prime target for credential theft. Attackers often attempt to load malicious DLLs into LSASS to gain access to encrypted and plaintext passwords. This can lead to the compromise of user accounts, including domain administrator accounts. The Elastic detection rule identifies such threats by monitoring for DLLs loaded into the LSASS process that do not have valid code signatures from trusted vendors, or that do not match a list of known good DLL hashes or file paths. The rule was last updated in May 2026, but the underlying threat remains relevant for modern environments.
Attack Chain
- The attacker gains initial access to the system through various means (e.g., phishing, exploiting vulnerabilities).
- The attacker obtains local administrator privileges on the target system.
- The attacker drops a malicious DLL onto the file system.
- The attacker configures the system to load the malicious DLL into the LSASS process. This can be achieved by modifying registry keys related to Security Support Providers (SSPs).
- LSASS loads the malicious DLL during system startup or a subsequent event that triggers SSP loading.
- The malicious DLL intercepts and captures credentials handled by LSASS, such as user passwords and smart card PINs.
- The attacker retrieves the captured credentials.
- The attacker uses the stolen credentials to escalate privileges or move laterally within the network.
Impact
A successful attack can lead to the compromise of user accounts, including those with domain administrator privileges. This allows the attacker to gain complete control over the affected Windows domain, potentially leading to data breaches, ransomware deployment, or other malicious activities. The impact is significant, as LSASS is a core component of the Windows security model. The number of potential victims depends on the scope of the attacker’s lateral movement and the privileges they gain.
Recommendation
- Deploy the Sigma rule “LSASS Loading Unsigned or Untrusted DLL” to your SIEM to detect suspicious DLLs being loaded into LSASS.
- Enable Sysmon event logging for process creation and module loading events to provide the necessary data for the Sigma rule to function.
- Regularly review and update the exclusion lists in the Sigma rule to account for legitimate software vendors and DLLs specific to your environment.
- Implement application whitelisting to prevent unauthorized DLLs from being loaded into critical processes like LSASS.
- Monitor registry modifications related to Security Support Providers (SSPs) to detect unauthorized changes that could lead to malicious DLL loading.
- Investigate any alerts generated by the Sigma rule promptly, following the triage and analysis steps outlined in the rule’s documentation.
Detection coverage 2
LSASS Loading Unsigned or Untrusted DLL
mediumDetects LSASS loading a DLL that is either unsigned or not signed by a trusted vendor, which may indicate credential access attempts.
LSASS Loading DLL with Suspicious Hash
mediumDetects LSASS loading a DLL with a known malicious SHA256 hash, which could indicate credential access attempts.
Detection queries are available on the platform. Get full rules →