heroui logo

Windows Non-System Account Targeting Lsass

Splunk Security Content

View Source
Summary
The detection rule, "Windows Non-System Account Targeting Lsass", identifies access attempts to the Local Security Authority Subsystem Service (lsass.exe) by non-SYSTEM accounts. This rule is crucial for monitoring potential credential dumping activities or unauthorized access to sensitive credentials, as such actions could lead to privilege escalation or lateral movement in the network. The detection leverages Sysmon EventCode 10 logs, which capture access requests to lsass.exe from users that are not part of the SYSTEM account. Given the severity of the potential implications—loss or compromise of credentials—immediate investigation is recommended for any flagged access attempt. Proper implementation also requires ensuring that Sysmon is correctly configured to log the pertinent events.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1003.001
  • T1003
Created: 2024-11-13