<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Memory-Dump — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/memory-dump/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 Nov 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/memory-dump/feed.xml" rel="self" type="application/rss+xml"/><item><title>MemProcFS Usage for Memory Dump Mounting and Credential Access</title><link>https://feed.craftedsignal.io/briefs/2024-11-memprocfs-memory-dump/</link><pubDate>Sat, 02 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-memprocfs-memory-dump/</guid><description>Adversaries use MemProcFS, a memory forensics tool, to mount memory dumps as virtual file systems and extract sensitive information like credentials from LSASS or registry hives.</description><content:encoded><![CDATA[<p>MemProcFS is a memory forensics tool that allows users to mount physical memory as a virtual file system. While legitimate uses exist for forensic analysis, adversaries are abusing it to gain unauthorized access to sensitive information. Observed tactics involve mounting memory dumps of compromised systems and extracting credentials, LSA secrets, SAM data, and cached domain credentials. This activity is particularly concerning as it allows threat actors to bypass traditional security measures and directly access sensitive data within the memory space of targeted processes. Unapproved usage of MemProcFS should be considered suspicious and investigated immediately to prevent credential theft and lateral movement.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system through unspecified means (e.g., exploiting a vulnerability or using stolen credentials).</li>
<li>The attacker obtains a memory dump of the compromised system, which may contain sensitive information.</li>
<li>The attacker executes <code>MemProcFS.exe</code> with the <code>-device</code> parameter to mount the memory dump as a virtual file system.</li>
<li>MemProcFS creates a virtual file system representation of the memory dump, allowing the attacker to browse the memory space as files and directories.</li>
<li>The attacker accesses the memory of the LSASS process (lsass.exe) through the mounted file system.</li>
<li>The attacker extracts credentials, such as usernames and passwords, from the LSASS process memory.</li>
<li>The attacker may also access registry hives through the mounted file system to obtain LSA secrets, SAM data, and cached domain credentials.</li>
<li>The attacker uses the stolen credentials for lateral movement, privilege escalation, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows threat actors to steal sensitive information, including credentials, LSA secrets, SAM data, and cached domain credentials. Compromised credentials can be used for lateral movement within the network, privilege escalation, and further data breaches. The number of potential victims is unknown, but the severity of the impact is high due to the potential for widespread compromise. Sectors at risk include any organization that stores sensitive data on Windows systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect MemProcFS Execution with Device Parameter&rdquo; to your SIEM to identify suspicious use of MemProcFS based on process creation events.</li>
<li>Enable Sysmon process creation logging to provide the necessary data for the Sigma rules above.</li>
<li>Monitor for unusual file system access patterns that may indicate a memory dump being mounted as a virtual file system.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>memory-dump</category><category>memprocfs</category></item><item><title>LSASS Memory Dump Handle Access Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-lsass-memory-dump/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lsass-memory-dump/</guid><description>This rule detects handle requests for LSASS object access with specific access masks (0x1fffff, 0x1010, 0x120089, 0x1F3FFF) indicative of memory dumping, commonly employed by tools like SharpDump, Procdump, Mimikatz, and Comsvcs to extract credentials from the LSASS process on Windows systems.</description><content:encoded><![CDATA[<p>The Local Security Authority Subsystem Service (LSASS) is a critical Windows process responsible for enforcing security policy and handling user authentication. Attackers often target LSASS to steal credentials for lateral movement and privilege escalation. This detection identifies attempts to access LSASS memory using specific access masks (0x1fffff, 0x1010, 0x120089, 0x1F3FFF) that are commonly used by tools designed to dump LSASS memory. The rule is designed to be tool-agnostic, detecting the underlying behavior rather than specific tool signatures. It has been validated against various LSASS dumping tools, including SharpDump, Procdump, Mimikatz, and Comsvcs. The rule triggers on Windows systems where handle manipulation is enabled and generates security event logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker elevates privileges to an administrative account or SYSTEM, necessary for accessing LSASS memory.</li>
<li>The attacker executes a credential dumping tool, such as Mimikatz, SharpDump, or Procdump.</li>
<li>The tool attempts to open a handle to the LSASS process (lsass.exe) with a specific access mask (0x1fffff, 0x1010, 0x120089, 0x1F3FFF) required for memory dumping.</li>
<li>Windows Security Event ID 4656 is generated, logging the handle request to the LSASS object.</li>
<li>The tool reads the memory contents of the LSASS process.</li>
<li>The dumped memory is parsed to extract sensitive information, such as passwords, NTLM hashes, and Kerberos tickets.</li>
<li>The attacker uses the stolen credentials to move laterally to other systems or access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful LSASS memory dumping allows attackers to steal user credentials, enabling lateral movement and privilege escalation within the network. This can lead to widespread compromise, data breaches, and significant disruption of services. Stolen credentials can be used to access sensitive data, control critical systems, and maintain a persistent presence within the environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Handle Manipulation to generate the necessary events for this rule to function, as described in the <a href="https://ela.st/audit-handle-manipulation">setup instructions</a>.</li>
<li>Deploy the Sigma rule <code>LSASS Memory Dump Handle Access</code> to your SIEM and tune the exceptions based on your environment to minimize false positives.</li>
<li>Investigate any alerts generated by this rule, focusing on the process execution chain (parent process tree) to identify the source of the LSASS handle request.</li>
<li>Review the processes excluded in the rule (WmiPrvSE.exe, dllhost.exe, svchost.exe, msiexec.exe, explorer.exe) and ensure these exclusions are valid for your environment.</li>
<li>Implement strong password policies and multi-factor authentication to mitigate the impact of credential theft.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>memory-dump</category><category>windows</category></item></channel></rss>