Mimikatz MemSSP Log File Detection
This rule detects the creation of the default Mimikatz MemSSP credential log file, mimilsa.log, which is created after the misc::memssp module injects a malicious Security Support Provider into LSASS, potentially capturing credentials from subsequent logons.
This detection identifies the creation of the mimilsa.log file, a default log generated by the Mimikatz misc::memssp module. The misc::memssp module injects a malicious Security Support Provider (SSP) into the Local Security Authority Subsystem Service (LSASS) process. This injected SSP logs credentials from subsequent logons to the compromised host, allowing attackers to capture sensitive information. The creation of this log file is a strong indicator of credential access attempts and the potential compromise of user accounts and system security. This rule is designed for data generated by Elastic Defend and also supports data from CrowdStrike, Microsoft Defender XDR, and SentinelOne Cloud Funnel.
Attack Chain
- An attacker gains initial access to a Windows system (e.g., via phishing or exploiting a vulnerability).
- The attacker executes Mimikatz or a similar tool with the
misc::memsspmodule. - Mimikatz injects a malicious SSP library (e.g.,
mimilib.dll) into the LSASS process (lsass.exe). - The injected SSP hooks into the authentication process.
- When users log on to the system, the SSP captures their credentials.
- The captured credentials are written to the
mimilsa.logfile, typically located inC:\Windows\System32\. - The attacker retrieves the
mimilsa.logfile to obtain the captured credentials. - The attacker uses the stolen credentials to escalate privileges, move laterally within the network, and access sensitive resources.
Impact
A successful Mimikatz MemSSP attack can lead to the compromise of user accounts, including those with administrative privileges. This allows attackers to gain unauthorized access to sensitive data, systems, and resources within the organization. Lateral movement becomes easier, potentially impacting a large number of systems. The compromised credentials can also be used for external attacks, such as gaining access to cloud services or other external resources.
Recommendation
- Deploy the Sigma rule
Mimikatz Memssp Log File Detectedto your SIEM and tune for your environment. - Enable Sysmon file creation logging to detect the creation of
mimilsa.logfiles. - Investigate any alerts generated by the Sigma rule, focusing on the process that created the log file and any subsequent file access.
- Monitor for the presence of
mimilib.dlland any LSA Security Packages registry modifications, as these may indicate persistent SSP installation. - Review and restrict interactive logons to high-value hosts to minimize the potential for credential theft.
- Investigate related alerts for the same
host.idin the last 48 hours covering delivery, privilege escalation, LSASS access, persistence, lateral movement, or additional credential access.
Detection coverage 2
Mimikatz Memssp Log File Detected
highDetects the creation of the default Mimikatz MemSSP credential log file, mimilsa.log, by lsass.exe
Suspicious Process Accessing Mimikatz Memssp Log File
mediumDetects processes other than lsass.exe accessing the Mimikatz Memssp credential log file, mimilsa.log
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
file
| Type | Value |
|---|---|
| file | mimilsa.log |