Files
blue-team-tools/rules/windows/process_access/win_susp_proc_access_lsass.yml
T
2021-11-22 21:30:19 +01:00

98 lines
3.2 KiB
YAML

title: Suspicious GrantedAccess Flags on LSASS Access
id: a18dd26b-6450-46de-8c91-9659150cf088
related:
- id: 32d0d3e2-e58d-4d41-926b-18b520b2b32d
type: obsoletes
status: experimental
description: Detects process access to LSASS memory with suspicious access flags
author: Florian Roth
date: 2021/11/22
references:
- https://docs.microsoft.com/en-us/windows/win32/procthread/process-security-and-access-rights
- https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow
- https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
- http://security-research.dyndns.org/pub/slides/FIRST2017/FIRST-2017_Tom-Ueltschi_Sysmon_FINAL_notes.pdf
tags:
- attack.credential_access
- attack.t1003.001
- attack.t1003 # an old one
- attack.s0002
logsource:
category: process_access
product: windows
detection:
selection:
TargetImage|endswith: '\lsass.exe'
GrantedAccess|endswith:
- '10'
- '30'
- '50'
- '70'
- '90'
- 'B0'
- 'D0'
- 'F0'
- '18'
- '38'
- '58'
- '78'
- '98'
- 'B8'
- 'D8'
- 'F8'
- '1A'
- '3A'
- '5A'
- '7A'
- '9A'
- 'BA'
- 'DA'
- 'FA'
# Absolute paths to programs that cause false positives
filter1:
SourceImage:
- 'C:\WINDOWS\system32\taskmgr.exe'
- 'C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe'
- 'C:\PROGRAMDATA\MALWAREBYTES\MBAMSERVICE\ctlrupdate\mbupdatr.exe'
# Windows Defender
filter2:
SourceImage|startswith: 'C:\ProgramData\Microsoft\Windows Defender\'
SourceImage|endswith: '\MsMpEng.exe'
# Microsoft Gaming Services
filter3:
SourceImage|startswith: 'C:\Program Files\WindowsApps\'
SourceImage|endswith: '\GamingServices.exe'
GrantedAccess: '0x1410'
# Process Explorer
filter4:
SourceImage|endswith:
- '\PROCEXP64.EXE'
- '\PROCEXP.EXE'
GrantedAccess: '0x1410'
# VMware Tools
filter5:
SourceImage|startswith: 'C:\ProgramData\VMware\VMware Tools\'
SourceImage|endswith: '\vmtoolsd.exe'
# Antivirus and EDR agents
filter6:
SourceImage|startswith:
- 'C:\Progra Files\'
- 'C:\Progra Files (x86)\'
SourceImage|contains:
- 'Antivirus'
# Generic Filter for 0x1410 filter (caused by so many programs like DropBox updates etc.)
filter_generic:
SourceImage|startswith:
- 'C:\Program Files\'
- 'C:\Program Files (x86)\'
GrantedAccess: '0x1410'
condition: selection and not filter1 and not filter2 and not filter3 and not filter4 and not filter5 and not filter6 and not filter_generic
fields:
- User
- SourceImage
- GrantedAccess
falsepositives:
- Legitimate software accessing LSASS process for legitimate reason
level: high