heroui logo

Windows Terminating Lsass Process

Splunk Security Content

View Source
Summary
The analytic detects an anomalous activity involving the termination of the Lsass.exe process using Sysmon EventCode 10 logs. The termination of Lsass.exe is highly suspicious since it is a critical Windows process handling security policies and user credentials. The detection rule highlights processes that have been granted PROCESS_TERMINATE access to Lsass.exe, which may indicate attempts at credential dumping or privilege escalation. By leveraging Sysmon logs, which provide detailed insights into process activities, the rule aims to flag potential malicious behavior that could breach security protocols within the environment. The implementation of this detection requires proper Sysmon configuration and awareness of the possibility for false positives, necessitating careful tuning and validation in the operational environment.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Script
ATT&CK Techniques
  • T1562.001
  • T1562
Created: 2024-11-13