
Summary
This detection rule targets instances of potential credential dumping activities related to the Windows Error Reporting (WER) service, specifically when the Local Security Authority Subsystem Service (LSASS) process crashes. The rule is designed to identify event logs where the process that experienced an application error is 'lsass.exe', which is critical for maintaining security policies and managing user credentials. The detection focuses on specific attributes of the WER logs including the Provider Name 'Application Error', Event ID '1000', and Exception Code 'c0000001', which signify an application crash that might be exploited by attackers using techniques such as 'Lsass-Shtinkering'. This technique involves manipulating or crashing LSASS to dump sensitive credentials for unauthorized access. The detection is categorized under high severity due to the critical nature of the potential breach it aims to flag, and while there may be rare legitimate instances of lsass crashing, it is crucial to monitor these occurrences carefully to preemptively address possible security threats.
Categories
- Endpoint
- Windows
Data Sources
- Application Log
Created: 2022-12-07