heroui logo

Potential Credential Dumping Via WER

Sigma Rules

View Source
Summary
This detection rule identifies potential credential dumping activities using the LSASS Shtinkering technique via Windows Error Reporting (WER). The rule is designed to capture instances where the process 'WerFault.exe' is involved in suspicious command lines or behaviors typically associated with malicious credential extraction from the Local Security Authority Subsystem Service (LSASS) process. Specifically, the rule targets instances where 'WerFault.exe' is executed with certain command line parameters indicative of credential dumping attempts, while ensuring the parent process is 'lsass.exe'. By focusing on specific user names and command line patterns, the rule attempts to minimize false positives and enhance detection accuracy.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Application Log
Created: 2022-12-08