
Summary
This detection rule focuses on identifying unauthorized registry modifications that enable full memory dumps of the LSASS (Local Security Authority Subsystem Service) process. Specifically, it looks for changes to the 'DumpType' registry setting to a value of '2', which indicates that a full dump of the LSASS process can be made. This technique, known as 'LSASS Shtinkering', is often employed by attackers seeking to extract sensitive information such as passwords and credentials stored in memory. The rule captures events related to the 'TargetObject' containing references to the LSASS related registry paths. If the 'DumpType' is set to '2', it triggers an alert because this setting is a strong indicator of potential credential theft activities. The rule’s design is built to minimize false positives by being specific to the LSASS process and monitoring only relevant registry changes.
Categories
- Windows
Data Sources
- Windows Registry
Created: 2022-12-08