
Summary
This rule aims to detect instances where an unsigned image (either a DLL or EXE file) is loaded into the LSASS (Local Security Authority Subsystem Service) process in a Windows environment. LSASS is a critical system process responsible for enforcing the security policy on the system, handling user logins, and managing sensitive credentials. Because of its importance, attackers often target LSASS for credential dumping to gain unauthorized access to user credentials and other sensitive data. By monitoring for unsigned images being injected into this process, organizations can identify potential malicious activities or compromise attempts. The detection configuration specifically checks for instances where an image loaded into LSASS is marked as unsigned, potentially indicating a malicious maneuver since legitimate signed software is expected in secure operations.
Categories
- Windows
- Endpoint
Data Sources
- Image
Created: 2019-10-22