<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Duplicatehandle — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/duplicatehandle/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 17:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/duplicatehandle/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Credential Access via LSASS Handle Duplication</title><link>https://feed.craftedsignal.io/briefs/2024-01-lsass-dupehandle/</link><pubDate>Wed, 03 Jan 2024 17:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lsass-dupehandle/</guid><description>Detection of suspicious LSASS handle access via DuplicateHandle from an unknown call trace module, indicating a potential attempt to bypass the NtOpenProcess API to evade detection and dump LSASS memory for credential access.</description><content:encoded><![CDATA[<p>This detection identifies suspicious attempts to access the Local Security Authority Subsystem Service (LSASS) memory via the DuplicateHandle function on Windows systems. LSASS is a critical process that manages user credentials, making it a prime target for credential dumping attacks. Attackers may use DuplicateHandle to bypass the NtOpenProcess API, which is commonly monitored, to evade detection. The rule focuses on EventCode 10, looking for lsass.exe requesting DuplicateHandle access rights (0x40) where the call trace originates from an unknown executable region (<em>UNKNOWN</em>). This technique is often associated with tools like MirrorDump.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system (e.g., via phishing or exploitation of a vulnerability).</li>
<li>The attacker executes a malicious program or script on the compromised system.</li>
<li>The malicious code attempts to open a handle to the LSASS process.</li>
<li>Instead of using NtOpenProcess, the attacker leverages the DuplicateHandle function to obtain a handle to LSASS.</li>
<li>The DuplicateHandle call originates from an unknown or suspicious module, as indicated by &ldquo;<em>UNKNOWN</em>&rdquo; in the call trace.</li>
<li>With a valid handle to LSASS, the attacker dumps the LSASS memory to a file or other location.</li>
<li>The attacker parses the dumped memory to extract sensitive credentials.</li>
<li>The attacker uses the stolen credentials for lateral movement, privilege escalation, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to the compromise of user credentials, including domain administrator accounts. This can give attackers unrestricted access to the entire domain, allowing them to steal sensitive data, install malware, or disrupt critical services. The impact can range from data breaches and financial loss to complete infrastructure compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation and event 10 logging to capture the necessary telemetry for this detection. (Setup instructions: <a href="https://ela.st/sysmon-event-10-setup">https://ela.st/sysmon-event-10-setup</a>)</li>
<li>Deploy the Sigma rule &ldquo;Potential Credential Access via DuplicateHandle in LSASS&rdquo; to your SIEM and tune for your environment to reduce false positives.</li>
<li>Investigate any alerts generated by this rule by reviewing the event logs and call trace details to identify suspicious modules or processes.</li>
<li>Implement enhanced monitoring and logging for LSASS and related processes to detect any future attempts to exploit the DuplicateHandle function.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>duplicatehandle</category><category>mirrordump</category><category>windows</category></item></channel></rss>