heroui logo

Credential Dumping Activity By Python Based Tool

Sigma Rules

View Source
Summary
This detection rule identifies potential credential dumping activity utilizing Python-based tools such as LaZagne or Pypykatz by monitoring access to the LSASS process. The rule focuses on the process access logs for the LSASS executable and looks for specific characteristics in the call trace that are indicative of Python execution, including the presence of Python dynamic link libraries (DLLs) and particular function traces consistent with credential dumping behaviors. The rule triggers when access to LSASS is achieved with high privileges, suggested by the granted access rights, and specific call traces that include Python DLLs. This is crucial as credential dumping is a common tactic used by attackers to steal sensitive user credentials from Windows systems.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Application Log
Created: 2023-11-27