<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Mimikatz — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/mimikatz/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 17:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/mimikatz/feed.xml" rel="self" type="application/rss+xml"/><item><title>Mimikatz MemSSP Log File Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-mimikatz-memssp-log/</link><pubDate>Wed, 03 Jan 2024 17:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mimikatz-memssp-log/</guid><description>This rule detects the creation of the default Mimikatz MemSSP credential log file, mimilsa.log, which is created after the misc::memssp module injects a malicious Security Support Provider into LSASS, potentially capturing credentials from subsequent logons.</description><content:encoded><![CDATA[<p>This detection identifies the creation of the <code>mimilsa.log</code> file, a default log generated by the Mimikatz <code>misc::memssp</code> module. The <code>misc::memssp</code> module injects a malicious Security Support Provider (SSP) into the Local Security Authority Subsystem Service (LSASS) process. This injected SSP logs credentials from subsequent logons to the compromised host, allowing attackers to capture sensitive information. The creation of this log file is a strong indicator of credential access attempts and the potential compromise of user accounts and system security. This rule is designed for data generated by Elastic Defend and also supports data from CrowdStrike, Microsoft Defender XDR, and SentinelOne Cloud Funnel.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker executes Mimikatz or a similar tool with the <code>misc::memssp</code> module.</li>
<li>Mimikatz injects a malicious SSP library (e.g., <code>mimilib.dll</code>) into the LSASS process (<code>lsass.exe</code>).</li>
<li>The injected SSP hooks into the authentication process.</li>
<li>When users log on to the system, the SSP captures their credentials.</li>
<li>The captured credentials are written to the <code>mimilsa.log</code> file, typically located in <code>C:\Windows\System32\</code>.</li>
<li>The attacker retrieves the <code>mimilsa.log</code> file to obtain the captured credentials.</li>
<li>The attacker uses the stolen credentials to escalate privileges, move laterally within the network, and access sensitive resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Mimikatz MemSSP attack can lead to the compromise of user accounts, including those with administrative privileges. This allows attackers to gain unauthorized access to sensitive data, systems, and resources within the organization. Lateral movement becomes easier, potentially impacting a large number of systems. The compromised credentials can also be used for external attacks, such as gaining access to cloud services or other external resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Mimikatz Memssp Log File Detected</code> to your SIEM and tune for your environment.</li>
<li>Enable Sysmon file creation logging to detect the creation of <code>mimilsa.log</code> files.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process that created the log file and any subsequent file access.</li>
<li>Monitor for the presence of <code>mimilib.dll</code> and any LSA Security Packages registry modifications, as these may indicate persistent SSP installation.</li>
<li>Review and restrict interactive logons to high-value hosts to minimize the potential for credential theft.</li>
<li>Investigate related alerts for the same <code>host.id</code> in the last 48 hours covering delivery, privilege escalation, LSASS access, persistence, lateral movement, or additional credential access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>mimikatz</category><category>memssp</category><category>windows</category></item><item><title>Detects Kirbi File Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-kirbi-file-creation/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kirbi-file-creation/</guid><description>Detects the creation of .kirbi files, a suspicious Kerberos ticket artifact often produced by ticket export or dumping tools such as Rubeus or Mimikatz, indicating preparation for Kerberos ticket theft or Pass-The-Ticket (PTT) attacks.</description><content:encoded><![CDATA[<p>The creation of <code>.kirbi</code> files on Windows systems is a strong indicator of potential Kerberos ticket theft. These files are Kerberos ticket artifacts often associated with credential dumping and Pass-The-Ticket (PTT) attacks. Tools like Mimikatz and Rubeus are commonly used to export or dump Kerberos tickets, which are then saved as <code>.kirbi</code> files. Defenders should monitor the creation of these files, especially in unusual locations, and investigate the associated processes to determine if malicious activity is occurring. The rule provided is designed to detect these events across multiple data sources, providing a comprehensive approach to identifying this threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means, such as phishing or exploiting a vulnerability.</li>
<li>The attacker executes a Kerberos ticket dumping tool, such as Mimikatz or Rubeus.</li>
<li>The tool extracts Kerberos tickets from memory.</li>
<li>The extracted tickets are saved to a <code>.kirbi</code> file on the filesystem. This file is often created in a temporary or easily accessible location.</li>
<li>The attacker may rename or move the <code>.kirbi</code> file to evade detection or prepare it for later use.</li>
<li>The attacker uses the stolen Kerberos ticket to authenticate to other systems on the network (Pass-The-Ticket).</li>
<li>The attacker gains unauthorized access to sensitive resources or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Kerberos ticket theft can lead to significant damage, including unauthorized access to sensitive data, lateral movement across the network, and privilege escalation. Depending on the compromised account, an attacker can potentially gain control of critical systems and data. If a domain administrator account is compromised, the entire domain could be at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Kirbi File Creation</code> to your SIEM to detect the creation of <code>.kirbi</code> files.</li>
<li>Enable Sysmon FileCreate events (Event ID 11) to provide the necessary data for the <code>Kirbi File Creation</code> rule to function effectively.</li>
<li>Investigate any alerts generated by the <code>Kirbi File Creation</code> rule, focusing on the process that created the file, the location of the file, and any follow-on activity.</li>
<li>Consider blocking the execution of known Kerberos ticket dumping tools, such as Mimikatz and Rubeus.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>kerberos</category><category>pass-the-ticket</category><category>mimikatz</category><category>rubeus</category></item><item><title>Potential Invoke-Mimikatz PowerShell Script</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-potential-invoke-mimikatz/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-potential-invoke-mimikatz/</guid><description>This rule detects the use of Invoke-Mimikatz or Mimikatz commands within PowerShell scripts to dump credentials, extract password stores, export certificates, or use alternate authentication material, indicating potential in-memory credential access.</description><content:encoded><![CDATA[<p>This detection identifies PowerShell scripts containing Invoke-Mimikatz or Mimikatz commands, which are commonly used to extract sensitive information such as credentials, password stores, and certificates. The detection focuses on in-memory credential access, requiring thorough investigation and reconstruction of script context to assess the impact. The rule is designed to detect potential credential access attempts by identifying specific keywords and command patterns associated with Mimikatz usage within PowerShell script blocks. Defenders should prioritize investigations triggered by this rule due to the potential for significant compromise. The Elastic detection rule was last updated on 2026/04/24.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a PowerShell script, either directly or through a payload.</li>
<li>The PowerShell script contains obfuscated or encoded Mimikatz commands.</li>
<li>The script leverages techniques to bypass AMSI (Anti-Malware Scan Interface) to avoid detection.</li>
<li>The script utilizes Invoke-Mimikatz or direct Mimikatz commands to dump credentials from memory (LSASS process).</li>
<li>The attacker extracts password hashes, plaintext passwords, and Kerberos tickets.</li>
<li>The attacker uses the stolen credentials to move laterally within the network.</li>
<li>The final objective is to gain access to sensitive data or critical systems, leading to data exfiltration or further compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can result in the compromise of user accounts, including privileged accounts. This can lead to lateral movement within the network, access to sensitive data, and potential data exfiltration. Credential dumping via Mimikatz is a common technique used in many attacks, often leading to widespread damage and significant financial loss. The rule&rsquo;s high risk score of 99 reflects the severe potential impact of this activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging to capture the necessary events (4104) for this detection, as specified in the <a href="https://ela.st/powershell-logging-setup">setup instructions</a>.</li>
<li>Deploy the Sigma rule below to your SIEM and tune it for your environment to detect potential Mimikatz usage within PowerShell scripts.</li>
<li>Investigate any alerts generated by this rule by reconstructing the full PowerShell script block using <code>powershell.file.script_block_id</code>, <code>powershell.sequence</code>, and <code>powershell.total</code> as described in the rule&rsquo;s notes.</li>
<li>Monitor for file creation events following the detection to identify potential credential dumps, archives, or exported certificates as highlighted in the rule&rsquo;s notes.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>credential-access</category><category>mimikatz</category><category>powershell</category></item></channel></rss>