<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Memssp — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/memssp/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 17:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/memssp/feed.xml" rel="self" type="application/rss+xml"/><item><title>Mimikatz MemSSP Log File Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-mimikatz-memssp-log/</link><pubDate>Wed, 03 Jan 2024 17:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mimikatz-memssp-log/</guid><description>This rule detects the creation of the default Mimikatz MemSSP credential log file, mimilsa.log, which is created after the misc::memssp module injects a malicious Security Support Provider into LSASS, potentially capturing credentials from subsequent logons.</description><content:encoded><![CDATA[<p>This detection identifies the creation of the <code>mimilsa.log</code> file, a default log generated by the Mimikatz <code>misc::memssp</code> module. The <code>misc::memssp</code> module injects a malicious Security Support Provider (SSP) into the Local Security Authority Subsystem Service (LSASS) process. This injected SSP logs credentials from subsequent logons to the compromised host, allowing attackers to capture sensitive information. The creation of this log file is a strong indicator of credential access attempts and the potential compromise of user accounts and system security. This rule is designed for data generated by Elastic Defend and also supports data from CrowdStrike, Microsoft Defender XDR, and SentinelOne Cloud Funnel.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker executes Mimikatz or a similar tool with the <code>misc::memssp</code> module.</li>
<li>Mimikatz injects a malicious SSP library (e.g., <code>mimilib.dll</code>) into the LSASS process (<code>lsass.exe</code>).</li>
<li>The injected SSP hooks into the authentication process.</li>
<li>When users log on to the system, the SSP captures their credentials.</li>
<li>The captured credentials are written to the <code>mimilsa.log</code> file, typically located in <code>C:\Windows\System32\</code>.</li>
<li>The attacker retrieves the <code>mimilsa.log</code> file to obtain the captured credentials.</li>
<li>The attacker uses the stolen credentials to escalate privileges, move laterally within the network, and access sensitive resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Mimikatz MemSSP attack can lead to the compromise of user accounts, including those with administrative privileges. This allows attackers to gain unauthorized access to sensitive data, systems, and resources within the organization. Lateral movement becomes easier, potentially impacting a large number of systems. The compromised credentials can also be used for external attacks, such as gaining access to cloud services or other external resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Mimikatz Memssp Log File Detected</code> to your SIEM and tune for your environment.</li>
<li>Enable Sysmon file creation logging to detect the creation of <code>mimilsa.log</code> files.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process that created the log file and any subsequent file access.</li>
<li>Monitor for the presence of <code>mimilib.dll</code> and any LSA Security Packages registry modifications, as these may indicate persistent SSP installation.</li>
<li>Review and restrict interactive logons to high-value hosts to minimize the potential for credential theft.</li>
<li>Investigate related alerts for the same <code>host.id</code> in the last 48 hours covering delivery, privilege escalation, LSASS access, persistence, lateral movement, or additional credential access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>mimikatz</category><category>memssp</category><category>windows</category></item></channel></rss>