Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_handlekatz.yml
T
2022-08-20 09:01:51 +02:00

40 lines
1.2 KiB
YAML

title: HandleKatz LSASS Dumper Usage
id: ca621ba5-54ab-4035-9942-d378e6fcde3c
description: Detects the use of HandleKatz, a tool that demonstrates the usage of cloned handles to Lsass in order to create an obfuscated memory dump of the same
references:
- https://github.com/codewhitesec/HandleKatz
status: experimental
author: Florian Roth
date: 2022/08/18
logsource:
category: process_creation
product: windows
detection:
selection_loader:
Image|endswith: '\loader.exe'
CommandLine|contains: '--pid:'
selection_loader_imphash:
- Imphash:
- '38d9e015591bbfd4929e0d0f47fa0055'
- '0e2216679ca6e1094d63322e3412d650'
- Hashes:
- 'IMPHASH=38D9E015591BBFD4929E0D0F47FA0055'
- 'IMPHASH=0E2216679CA6E1094D63322E3412D650'
selection_flags_1:
CommandLine|contains|all:
- '--pid:'
- '--outfile:'
selection_flags_2:
CommandLine|contains:
- '.dmp'
- 'lsass'
- '.obf'
- 'dump'
condition: 1 of selection_loader_* or all of selection_flags*
falsepositives:
- Unknown
tags:
- attack.credential_access
- attack.t1003.001
level: high