heroui logo

Password Dumper Remote Thread in LSASS

Sigma Rules

View Source
Summary
This detection rule focuses on identifying malicious activities related to password dumping in Windows systems, specifically targeting the Local Security Authority Subsystem Service (LSASS). It achieves this by monitoring for the creation of remote threads (EventID 8) that involve the lsass.exe process as the target image. Since password dumper tools can spawn multiple events quickly, the rule addresses the need for vigilance against a single malicious execution that could lead to extensive credential theft. The rule specifies that any process indicated in the 'Process' field is to be treated as malicious in this context and notes the potential for false positives from legitimate antivirus products, which may also utilize similar threading techniques during their operation.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Logon Session
Created: 2017-02-19