<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Lsass — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/lsass/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 26 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/lsass/feed.xml" rel="self" type="application/rss+xml"/><item><title>LSASS Credential Dumping via Windows Error Reporting (WER) Abuse</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-lsass-shtinkering/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-lsass-shtinkering/</guid><description>Attackers can enable full user-mode dumps system-wide via registry modification to facilitate LSASS credential dumping, allowing extraction of credentials from process memory without deploying malware.</description><content:encoded><![CDATA[<p>The LSASS Shtinkering attack involves abusing Windows Error Reporting (WER) to dump the memory of the LSASS process, which contains sensitive credentials. By enabling full user-mode dumps system-wide, attackers can fake a crash on LSASS, causing WER to generate a dump file. This setting is not enabled by default and requires modifying the registry. The DeepInstinct researchers publicized this attack at Defcon 30, demonstrating a method to access credentials without directly injecting malware into the LSASS process. This technique allows attackers to bypass traditional endpoint detection mechanisms that focus on malware signatures, making it a stealthy approach to credential theft. Defenders should monitor for registry modifications related to WER dump settings to detect and prevent this attack.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system, potentially through phishing or exploitation of a vulnerability.</li>
<li>The attacker modifies the registry key <code>HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\DumpType</code> to the value <code>2</code> or <code>0x00000002</code> to enable full user-mode dumps system-wide.</li>
<li>The attacker triggers a crash or fakes a crash of the LSASS process.</li>
<li>Windows Error Reporting (WER) generates a full user-mode dump file of the LSASS process.</li>
<li>The dump file is stored in the location specified in the registry, typically <code>C:\ProgramData\Microsoft\Windows\WER\ReportQueue</code>.</li>
<li>The attacker accesses the generated dump file.</li>
<li>The attacker extracts credentials from the LSASS dump file using tools like Mimikatz or custom scripts.</li>
<li>The attacker uses the stolen credentials to move laterally within the network or access sensitive resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of domain credentials and other sensitive information stored in LSASS memory, such as NTLM hashes and Kerberos tickets. This can enable attackers to move laterally within the network, escalate privileges, and access critical systems and data. A single compromised system can lead to a widespread breach affecting numerous users and systems. The sectors most vulnerable are those handling sensitive data or critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Full User-Mode Dumps Enabled System-Wide&rdquo; to your SIEM to detect suspicious registry modifications related to Windows Error Reporting (WER).</li>
<li>Examine process execution logs to identify any suspicious processes that may have triggered the dump, especially those not matching the legitimate <code>svchost.exe</code> process with user IDs <code>S-1-5-18</code>, <code>S-1-5-19</code>, or <code>S-1-5-20</code> as described in the rule&rsquo;s investigation guide.</li>
<li>Monitor for access to WER dump files located in <code>C:\ProgramData\Microsoft\Windows\WER\ReportQueue</code> using file monitoring rules.</li>
<li>Review and update endpoint protection configurations to ensure they can detect and block credential dumping techniques as mentioned in the rule&rsquo;s response and remediation steps.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category><category>lsass</category><category>wepw</category></item><item><title>Suspicious LSASS Access via Malicious Secondary Logon Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-mal-seclogon-lsass/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mal-seclogon-lsass/</guid><description>An attacker abuses the Secondary Logon service (seclogon.dll) to gain unauthorized access to the LSASS process, potentially leaking credentials.</description><content:encoded><![CDATA[<p>This threat leverages the Windows Secondary Logon service (seclogon.dll) to gain unauthorized access to the Local Security Authority Subsystem Service (LSASS) process. The attack involves manipulating the seclogon service to leak an LSASS handle, which can then be used to extract credentials. This technique is often employed as a precursor to credential dumping and lateral movement within a compromised network. The detection focuses on identifying specific call traces to seclogon.dll coupled with suspicious access rights (0x14c0) when accessing LSASS, originating from svchost.exe. Defenders should monitor for this activity as it indicates a potential attempt to compromise sensitive credentials stored within LSASS memory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploitation of a vulnerability).</li>
<li>The attacker executes code within the context of a user account.</li>
<li>The attacker leverages the Secondary Logon service (seclogon.dll) to request access to LSASS.</li>
<li>The malicious code interacts with the seclogon service to obtain a handle to the LSASS process with specific access rights (0x14c0), typically from a svchost.exe process.</li>
<li>The seclogon service, acting on behalf of the attacker, grants access to LSASS.</li>
<li>The attacker uses the leaked LSASS handle to read memory contents.</li>
<li>The attacker extracts sensitive information, such as user credentials (passwords, NTLM hashes, Kerberos tickets), from the LSASS memory.</li>
<li>The attacker uses the stolen credentials for lateral movement, privilege escalation, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to steal user credentials, leading to unauthorized access to sensitive systems and data. This can result in data breaches, financial losses, and reputational damage. The compromise of domain administrator credentials can grant the attacker complete control over the entire Windows domain.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (event ID 1) and process access logging (event ID 10) to detect suspicious LSASS handle access.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Lsass Handle Access via MalSecLogon&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the call trace, access rights, and source process.</li>
<li>Monitor authentication events for signs of credential misuse following suspicious LSASS access.</li>
<li>Review local administrator and debug-privilege exposure, LSASS protection such as RunAsPPL or Credential Guard where supported, and Secondary Logon service necessity on critical servers</li>
<li>Block the GrantedAccess value &ldquo;0x14c0&rdquo; in conjunction with CallTrace &ldquo;<em>seclogon.dll</em>&rdquo; when the TargetImage is &ldquo;lsass.exe&rdquo; (Sysmon Event ID 10).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>seclogon</category><category>windows</category></item><item><title>LSASS Process Access via Windows API</title><link>https://feed.craftedsignal.io/briefs/2024-01-lsass-process-access/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lsass-process-access/</guid><description>Detection of access attempts to the LSASS handle, indicating potential credential dumping by monitoring API calls (OpenProcess, OpenThread, ReadProcessMemory) targeting lsass.exe.</description><content:encoded><![CDATA[<p>This rule identifies attempts to access the LSASS process via Windows API calls, specifically <code>OpenProcess</code>, <code>OpenThread</code>, and <code>ReadProcessMemory</code>. The Local Security Authority Subsystem Service (LSASS) is a critical Windows component responsible for managing user authentication and security policies. Attackers often target LSASS to dump credentials from memory for lateral movement and privilege escalation. This detection focuses on identifying unusual processes attempting to access the LSASS process, excluding common legitimate applications and directories. The rule leverages data from Elastic Defend and Microsoft Defender XDR to identify suspicious activity and provide defenders with actionable alerts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system through various means.</li>
<li>The attacker attempts to escalate privileges to gain administrative rights.</li>
<li>The attacker uses a custom tool or script to call the <code>OpenProcess</code>, <code>OpenThread</code> or <code>ReadProcessMemory</code> Windows APIs.</li>
<li>The tool targets the <code>lsass.exe</code> process to obtain a handle for memory access.</li>
<li>The attacker uses the obtained handle to read LSASS memory, searching for credential data.</li>
<li>The attacker extracts usernames, passwords, and other sensitive information from the dumped memory.</li>
<li>The attacker uses the stolen credentials for lateral movement to other systems on the network.</li>
<li>The attacker achieves their final objective, which may include data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of domain credentials, allowing attackers to move laterally within the network and gain access to sensitive resources. This can result in data breaches, system compromise, and significant financial or reputational damage. The rule aims to detect these attacks early, limiting the scope of the potential compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;LSASS API Access by Non-Standard Process&rdquo; to your SIEM and tune for your environment to detect suspicious access to the LSASS process.</li>
<li>Investigate any alerts triggered by this rule, focusing on the process execution chain and the access rights requested as documented in the provided Microsoft documentation.</li>
<li>Enable process creation and API call logging via Elastic Defend or Microsoft Defender XDR to provide the necessary data for this detection.</li>
<li>Review and harden LSASS protection mechanisms such as Credential Guard to minimize the risk of successful credential dumping.</li>
<li>Implement the Osquery queries to gather system information like DNS cache, services, and unsigned executables, to aid in investigation and threat hunting.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>windows</category></item><item><title>Potential LSASS Clone Creation via PssCaptureSnapShot</title><link>https://feed.craftedsignal.io/briefs/2024-01-lsass-clone-creation/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lsass-clone-creation/</guid><description>Detection of LSASS process cloning using PssCaptureSnapShot, where the parent process is also LSASS, indicating a potential attempt to dump LSASS memory for credential access.</description><content:encoded><![CDATA[<p>This detection identifies the creation of an LSASS process clone via <code>PssCaptureSnapShot</code> on Windows systems. The rule focuses on scenarios where the parent process of the new LSASS instance is also <code>lsass.exe</code>. This behavior is often associated with attackers attempting to bypass security controls and dump LSASS memory to extract credentials. The technique is used to evade detection mechanisms that monitor the primary LSASS process. Successful exploitation can lead to the compromise of domain or local credentials stored in memory, allowing for lateral movement and privilege escalation within the network. The detection is based on Windows Security Event Logs, specifically event code 4688, and is designed to identify this specific cloning behavior.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker executes code on the target system, potentially using tools like PowerShell or command-line utilities.</li>
<li>The attacker initiates a process to clone the LSASS process using <code>PssCaptureSnapShot</code>.</li>
<li>The newly created process, a clone of LSASS, runs alongside the original.</li>
<li>The attacker leverages the cloned LSASS process to dump its memory. This may involve tools like <code>comsvcs.dll</code>, <code>rundll32.exe</code> or custom scripts leveraging the MiniDumpWriteDump function.</li>
<li>The attacker extracts sensitive information from the dumped memory, including usernames, passwords, and Kerberos tickets.</li>
<li>The attacker uses the extracted credentials to move laterally within the network, accessing additional systems and resources.</li>
<li>The attacker achieves their final objective, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can result in the compromise of sensitive credentials stored in LSASS memory, including domain and local account credentials. This can lead to unauthorized access to critical systems and data, potentially resulting in data breaches, financial loss, and reputational damage. Domain controllers, jump hosts, and systems with privileged accounts are at especially high risk. The number of affected systems can range from a single machine to a large portion of the network, depending on the attacker&rsquo;s objectives and the scope of the compromised credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and monitor Windows Security Event Logs with event code 4688 for process creation events, specifically focusing on the process and parent process names to identify LSASS cloning attempts (see rule below).</li>
<li>Deploy the provided Sigma rule to your SIEM to detect potential LSASS clone creation via <code>PssCaptureSnapShot</code>. Tune the rule for your environment to reduce false positives.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the processes involved in cloning and dumping LSASS memory.</li>
<li>Enable Audit Process Creation and Command Line logging as per the Elastic documentation to ensure the events used by the provided Sigma rules are captured.</li>
<li>If a LSASS clone is detected, review authentication events (4624, 4648, 4625) on the affected host to identify any suspicious logons or credential usage.</li>
<li>Monitor for file activity related to memory dumps (e.g., .dmp files) using the process clone to identify potential credential theft attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>process-injection</category></item><item><title>Potential Credential Access via LSASS Handle Duplication</title><link>https://feed.craftedsignal.io/briefs/2024-01-lsass-dupehandle/</link><pubDate>Wed, 03 Jan 2024 17:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lsass-dupehandle/</guid><description>Detection of suspicious LSASS handle access via DuplicateHandle from an unknown call trace module, indicating a potential attempt to bypass the NtOpenProcess API to evade detection and dump LSASS memory for credential access.</description><content:encoded><![CDATA[<p>This detection identifies suspicious attempts to access the Local Security Authority Subsystem Service (LSASS) memory via the DuplicateHandle function on Windows systems. LSASS is a critical process that manages user credentials, making it a prime target for credential dumping attacks. Attackers may use DuplicateHandle to bypass the NtOpenProcess API, which is commonly monitored, to evade detection. The rule focuses on EventCode 10, looking for lsass.exe requesting DuplicateHandle access rights (0x40) where the call trace originates from an unknown executable region (<em>UNKNOWN</em>). This technique is often associated with tools like MirrorDump.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system (e.g., via phishing or exploitation of a vulnerability).</li>
<li>The attacker executes a malicious program or script on the compromised system.</li>
<li>The malicious code attempts to open a handle to the LSASS process.</li>
<li>Instead of using NtOpenProcess, the attacker leverages the DuplicateHandle function to obtain a handle to LSASS.</li>
<li>The DuplicateHandle call originates from an unknown or suspicious module, as indicated by &ldquo;<em>UNKNOWN</em>&rdquo; in the call trace.</li>
<li>With a valid handle to LSASS, the attacker dumps the LSASS memory to a file or other location.</li>
<li>The attacker parses the dumped memory to extract sensitive credentials.</li>
<li>The attacker uses the stolen credentials for lateral movement, privilege escalation, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to the compromise of user credentials, including domain administrator accounts. This can give attackers unrestricted access to the entire domain, allowing them to steal sensitive data, install malware, or disrupt critical services. The impact can range from data breaches and financial loss to complete infrastructure compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation and event 10 logging to capture the necessary telemetry for this detection. (Setup instructions: <a href="https://ela.st/sysmon-event-10-setup">https://ela.st/sysmon-event-10-setup</a>)</li>
<li>Deploy the Sigma rule &ldquo;Potential Credential Access via DuplicateHandle in LSASS&rdquo; to your SIEM and tune for your environment to reduce false positives.</li>
<li>Investigate any alerts generated by this rule by reviewing the event logs and call trace details to identify suspicious modules or processes.</li>
<li>Implement enhanced monitoring and logging for LSASS and related processes to detect any future attempts to exploit the DuplicateHandle function.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>duplicatehandle</category><category>mirrordump</category><category>windows</category></item><item><title>Suspicious LSASS Process Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-lsass-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-lsass-access/</guid><description>This rule identifies suspicious access attempts to the LSASS process, potentially indicating credential dumping attempts by filtering out legitimate processes and access patterns to focus on anomalies.</description><content:encoded><![CDATA[<p>The Local Security Authority Subsystem Service (LSASS) is a critical Windows component responsible for enforcing security policies and handling user authentication. Attackers often target LSASS to extract credentials, enabling unauthorized access and privilege escalation. This detection rule identifies suspicious access attempts to LSASS memory, which may indicate credential dumping activities. It filters out common legitimate processes and access patterns to highlight anomalous behaviors associated with credential theft. The rule is designed to detect unauthorized access attempts by monitoring process access events and filtering out known benign processes that interact with LSASS. It helps defenders identify potential credential access attempts before they lead to significant compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through phishing or exploitation of a vulnerability.</li>
<li>The attacker executes a malicious process or script on the compromised system.</li>
<li>The malicious process attempts to gain a handle to the LSASS process.</li>
<li>The attacker&rsquo;s tool requests specific access rights to LSASS, such as <code>ReadProcessMemory</code> (0x0010) or <code>PROCESS_QUERY_INFORMATION</code> (0x0400), which are necessary for memory dumping.</li>
<li>The attacker&rsquo;s process bypasses or disables endpoint detection and response (EDR) solutions to avoid detection.</li>
<li>The tool dumps the LSASS memory, extracting sensitive information like usernames, passwords, and Kerberos tickets.</li>
<li>The attacker uses the extracted credentials to move laterally within the network, accessing other systems and resources.</li>
<li>The attacker achieves their objective, such as data exfiltration or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful LSASS memory dump can lead to the compromise of domain credentials, allowing attackers to move laterally within the network and gain access to sensitive data and systems. This can result in data breaches, financial loss, and reputational damage. Organizations across all sectors are vulnerable, particularly those with weak credential management practices. A single compromised account can lead to widespread damage, potentially affecting thousands of systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process access event logging (Event ID 10) as described in the setup instructions linked in the rule to collect the necessary data.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Lsass Process Access&rdquo; to your SIEM and tune the exclusions based on your environment to reduce false positives.</li>
<li>Review and harden privileged account management practices to limit the impact of credential compromise.</li>
<li>Monitor systems for unusual process creation events, especially those spawning from unexpected locations, to identify potential initial access points.</li>
<li>Regularly scan systems for vulnerabilities and apply patches to prevent exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>windows</category></item><item><title>LSASS Loading Suspicious DLL</title><link>https://feed.craftedsignal.io/briefs/2024-01-lsass-suspicious-dll/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lsass-suspicious-dll/</guid><description>Detection of LSASS loading an unsigned or untrusted DLL, which can indicate credential access attempts by malicious actors targeting sensitive information stored in the LSASS process.</description><content:encoded><![CDATA[<p>The Local Security Authority Subsystem Service (LSASS) is a critical Windows component that manages security policies and user authentication. Attackers often target LSASS to dump credentials, using techniques like injecting malicious DLLs. This detection focuses on identifying instances where LSASS loads a DLL that is either unsigned or not signed by a trusted vendor. The rule excludes known legitimate signatures and file hashes to reduce false positives. This activity is a strong indicator of credential access attempts, potentially leading to further compromise of the system and network. The signatures identified in the rule contain well-known software vendors like Microsoft, McAfee and Citrix.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through various means (e.g., phishing, exploiting a vulnerability).</li>
<li>The attacker elevates privileges to gain sufficient access to interact with the LSASS process.</li>
<li>The attacker drops a malicious DLL onto the system, often disguised as a legitimate file.</li>
<li>The attacker injects the malicious DLL into the LSASS process using techniques like Reflective DLL Injection.</li>
<li>LSASS loads the injected DLL, granting the attacker access to sensitive credentials stored in memory.</li>
<li>The malicious DLL dumps credentials, such as plaintext passwords or NTLM hashes.</li>
<li>The attacker uses the stolen credentials for lateral movement to other systems on the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to credential compromise, allowing attackers to move laterally within the network, access sensitive data, and potentially achieve complete domain dominance. This can result in data breaches, financial losses, and reputational damage. The impact depends on the level of access associated with the compromised credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the <code>LSASS Loading Untrusted DLL</code> Sigma rule to your SIEM to detect suspicious DLLs loaded by LSASS.</li>
<li>Investigate any alerts generated by the Sigma rule and review the loaded DLL&rsquo;s code signature and hash.</li>
<li>Block the identified SHA256 hashes listed in the IOC table to prevent the execution of known malicious DLLs.</li>
<li>Implement application whitelisting to restrict which DLLs can be loaded into LSASS.</li>
<li>Enable Sysmon process creation and image load logging to provide the necessary data for detection.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>dll-injection</category><category>windows</category></item><item><title>LSASS Memory Dump Handle Access Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-lsass-memory-dump/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lsass-memory-dump/</guid><description>This rule detects handle requests for LSASS object access with specific access masks (0x1fffff, 0x1010, 0x120089, 0x1F3FFF) indicative of memory dumping, commonly employed by tools like SharpDump, Procdump, Mimikatz, and Comsvcs to extract credentials from the LSASS process on Windows systems.</description><content:encoded><![CDATA[<p>The Local Security Authority Subsystem Service (LSASS) is a critical Windows process responsible for enforcing security policy and handling user authentication. Attackers often target LSASS to steal credentials for lateral movement and privilege escalation. This detection identifies attempts to access LSASS memory using specific access masks (0x1fffff, 0x1010, 0x120089, 0x1F3FFF) that are commonly used by tools designed to dump LSASS memory. The rule is designed to be tool-agnostic, detecting the underlying behavior rather than specific tool signatures. It has been validated against various LSASS dumping tools, including SharpDump, Procdump, Mimikatz, and Comsvcs. The rule triggers on Windows systems where handle manipulation is enabled and generates security event logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker elevates privileges to an administrative account or SYSTEM, necessary for accessing LSASS memory.</li>
<li>The attacker executes a credential dumping tool, such as Mimikatz, SharpDump, or Procdump.</li>
<li>The tool attempts to open a handle to the LSASS process (lsass.exe) with a specific access mask (0x1fffff, 0x1010, 0x120089, 0x1F3FFF) required for memory dumping.</li>
<li>Windows Security Event ID 4656 is generated, logging the handle request to the LSASS object.</li>
<li>The tool reads the memory contents of the LSASS process.</li>
<li>The dumped memory is parsed to extract sensitive information, such as passwords, NTLM hashes, and Kerberos tickets.</li>
<li>The attacker uses the stolen credentials to move laterally to other systems or access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful LSASS memory dumping allows attackers to steal user credentials, enabling lateral movement and privilege escalation within the network. This can lead to widespread compromise, data breaches, and significant disruption of services. Stolen credentials can be used to access sensitive data, control critical systems, and maintain a persistent presence within the environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Handle Manipulation to generate the necessary events for this rule to function, as described in the <a href="https://ela.st/audit-handle-manipulation">setup instructions</a>.</li>
<li>Deploy the Sigma rule <code>LSASS Memory Dump Handle Access</code> to your SIEM and tune the exceptions based on your environment to minimize false positives.</li>
<li>Investigate any alerts generated by this rule, focusing on the process execution chain (parent process tree) to identify the source of the LSASS handle request.</li>
<li>Review the processes excluded in the rule (WmiPrvSE.exe, dllhost.exe, svchost.exe, msiexec.exe, explorer.exe) and ensure these exclusions are valid for your environment.</li>
<li>Implement strong password policies and multi-factor authentication to mitigate the impact of credential theft.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>memory-dump</category><category>windows</category></item><item><title>LSASS Memory Dump Creation Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-lsass-dump-creation/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lsass-dump-creation/</guid><description>This rule identifies the creation of LSASS memory dump files, often indicative of credential access attempts using tools like Task Manager, SQLDumper, Dumpert, or AndrewSpecial, by monitoring for specific filenames and excluding legitimate dump locations.</description><content:encoded><![CDATA[<p>This detection rule identifies the creation of LSASS memory dump files on Windows systems, which is a common technique used by attackers to extract credentials. The rule focuses on specific filenames associated with LSASS dumps and tools used for creating these dumps, such as <code>lsass*.dmp</code>, <code>dumpert.dmp</code>, <code>Andrew.dmp</code>, <code>SQLDmpr*.mdmp</code>, and <code>Coredump.dmp</code>. The rule excludes known legitimate crash analysis paths and SQLDumper dump locations to reduce false positives. The rule aims to detect credential access attempts through trusted utilities such as Task Manager or SQLDumper, or known tooling such as Dumpert and AndrewSpecial. It is designed to work with data from Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker executes a tool or utility to create a memory dump of the LSASS process. This can be done using built-in tools like Task Manager or SQLDumper, or third-party tools like Dumpert or AndrewSpecial.</li>
<li>The tool writes the LSASS memory dump to a file with a name matching a known pattern, such as <code>lsass.dmp</code>, <code>dumpert.dmp</code>, or <code>SQLDmpr0001.mdmp</code>.</li>
<li>The file is created in a location that is not a known legitimate crash dump location (e.g., not in <code>\Windows\System32\config\systemprofile\AppData\Local\CrashDumps\</code>).</li>
<li>The attacker may move, copy, or archive the dump file to avoid detection or to prepare it for exfiltration.</li>
<li>The attacker uses another tool, such as Mimikatz, to parse the LSASS memory dump and extract credentials.</li>
<li>The attacker uses the extracted credentials to move laterally to other systems or to access sensitive data.</li>
<li>The final objective is often to gain domain administrator privileges or to exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and credential extraction can lead to complete domain compromise, unauthorized access to sensitive data, and significant financial or reputational damage. The impact is amplified if the compromised system is a domain controller, jump host, or privileged admin workstation. The rule is designed to detect the initial stage of credential access and prevent further damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon FileCreate events (Event ID 11) to capture the creation of LSASS memory dump files.</li>
<li>Deploy the Sigma rule <code>LSASS Memory Dump Creation</code> to your SIEM to detect suspicious LSASS memory dump creation events and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process executable, parent process, file path, and user context.</li>
<li>If a suspicious LSASS memory dump is found, isolate the affected host and begin credential hygiene for implicated accounts and systems.</li>
<li>Block known malicious tools like Dumpert and AndrewSpecial from running on your network.</li>
<li>Monitor for related credential-access, staging, privilege, or lateral-movement alerts for the same user or host.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential_access</category><category>lsass</category><category>memory_dump</category><category>windows</category></item></channel></rss>