
Summary
This rule is designed to detect potential credential dumping activities that leverage the LSASS (Local Security Authority Subsystem Service) process on Windows systems. The detection mechanism monitors for instances where a process clone of LSASS is created, specifically checking if the process's parent image ends with '\Windows\System32\lsass.exe'. Such behavior is suspicious as it often relates to techniques used by attackers to extract credentials from memory. The rule is classified as critical due to the high risk associated with credential dumping, which can lead to further compromise of systems and networks. The detection logic utilizes a straightforward condition that identifies any process that has LSASS as its parent and itself is also an LSASS process. This raises alerts for further investigation to prevent unauthorized access and mitigate potential breaches. References provided lead to external resources that elaborate on Windows Defender ATP's capabilities regarding credential dumping and related security concerns, aiding security teams in enhancing their understanding and response measures.
Categories
- Windows
Data Sources
- Process
Created: 2021-11-27