heroui logo

Windows Possible Credential Dumping

Splunk Security Content

View Source
Summary
This detection rule targets potential credential dumping activities in a Windows environment by monitoring for specific system access and CallTrace DLLs that interact with the LSASS (Local Security Authority Subsystem Service) process. It focuses on Sysmon EventCode 10 logs, observing access permission requests to lsass.exe and tracing calls involving well-known debugging DLLs (such as dbgcore.dll and ntdll.dll) that are commonly used in credential dumping tactics. Credential dumping allows malicious actors to gain unauthorized access to sensitive credentials, enabling them to achieve elevated privileges and persistence within the network. This rule is vital for identifying early signs of such malicious activities, allowing security teams to respond swiftly to potential threats before they result in significant security breaches.
Categories
  • Windows
  • Endpoint
Data Sources
  • Pod
  • Process
  • Application Log
ATT&CK Techniques
  • T1003.001
  • T1003
Created: 2024-11-13