Files
blue-team-tools/rules/windows/file_event/file_event_win_lsass_dump.yml
T
2022-03-10 21:03:16 +01:00

45 lines
1.4 KiB
YAML

title: LSASS Process Memory Dump Files
id: a5a2d357-1ab8-4675-a967-ef9990a59391
related:
- id: db2110f3-479d-42a6-94fb-d35bc1e46492
type: obsoletes
description: Detects file names used by different memory dumping tools to create a memory dump of the LSASS process memory, which contains user credentials
status: experimental
author: Florian Roth
references:
- https://www.google.com/search?q=procdump+lsass
- https://medium.com/@markmotig/some-ways-to-dump-lsass-exe-c4a75fdc49bf
- https://github.com/elastic/detection-rules/blob/main/rules/windows/credential_access_lsass_memdump_file_created.toml
date: 2021/11/15
modified: 2022/02/10
tags:
- attack.credential_access
- attack.t1003.001
logsource:
product: windows
category: file_event
detection:
selection1:
TargetFilename|endswith:
- '\lsass.dmp'
- '\lsass.zip'
- '\lsass.rar'
- '\Temp\dumpert.dmp'
- '\Andrew.dmp'
- '\Coredump.dmp'
selection2:
TargetFilename|contains:
- '\lsass_2' # default format of procdump v9.0 is lsass_YYMMDD_HHmmss.dmp
- '\lsassdump'
- '\lsassdmp'
selection3:
TargetFilename|contains|all:
- '\lsass'
- '.dmp'
selection4:
TargetFilename|contains: 'SQLDmpr'
TargetFilename|endswith: '.mdmp'
condition: 1 of selection*
falsepositives:
- Unknown
level: high