<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Seclogon — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/seclogon/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 09 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/seclogon/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious LSASS Access via Malicious Secondary Logon Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-mal-seclogon-lsass/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mal-seclogon-lsass/</guid><description>An attacker abuses the Secondary Logon service (seclogon.dll) to gain unauthorized access to the LSASS process, potentially leaking credentials.</description><content:encoded><![CDATA[<p>This threat leverages the Windows Secondary Logon service (seclogon.dll) to gain unauthorized access to the Local Security Authority Subsystem Service (LSASS) process. The attack involves manipulating the seclogon service to leak an LSASS handle, which can then be used to extract credentials. This technique is often employed as a precursor to credential dumping and lateral movement within a compromised network. The detection focuses on identifying specific call traces to seclogon.dll coupled with suspicious access rights (0x14c0) when accessing LSASS, originating from svchost.exe. Defenders should monitor for this activity as it indicates a potential attempt to compromise sensitive credentials stored within LSASS memory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploitation of a vulnerability).</li>
<li>The attacker executes code within the context of a user account.</li>
<li>The attacker leverages the Secondary Logon service (seclogon.dll) to request access to LSASS.</li>
<li>The malicious code interacts with the seclogon service to obtain a handle to the LSASS process with specific access rights (0x14c0), typically from a svchost.exe process.</li>
<li>The seclogon service, acting on behalf of the attacker, grants access to LSASS.</li>
<li>The attacker uses the leaked LSASS handle to read memory contents.</li>
<li>The attacker extracts sensitive information, such as user credentials (passwords, NTLM hashes, Kerberos tickets), from the LSASS memory.</li>
<li>The attacker uses the stolen credentials for lateral movement, privilege escalation, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to steal user credentials, leading to unauthorized access to sensitive systems and data. This can result in data breaches, financial losses, and reputational damage. The compromise of domain administrator credentials can grant the attacker complete control over the entire Windows domain.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (event ID 1) and process access logging (event ID 10) to detect suspicious LSASS handle access.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Lsass Handle Access via MalSecLogon&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the call trace, access rights, and source process.</li>
<li>Monitor authentication events for signs of credential misuse following suspicious LSASS access.</li>
<li>Review local administrator and debug-privilege exposure, LSASS protection such as RunAsPPL or Credential Guard where supported, and Secondary Logon service necessity on critical servers</li>
<li>Block the GrantedAccess value &ldquo;0x14c0&rdquo; in conjunction with CallTrace &ldquo;<em>seclogon.dll</em>&rdquo; when the TargetImage is &ldquo;lsass.exe&rdquo; (Sysmon Event ID 10).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>seclogon</category><category>windows</category></item></channel></rss>