
Summary
This rule is designed to detect the use of Mimikatz, a well-known credential dumping tool used by malicious actors to extract plaintext passwords, hashes, PIN codes, and Kerberos tickets from memory. Mimikatz can also facilitate attacks such as pass-the-hash, pass-the-ticket, and create Golden tickets, which are highly valuable to attackers for gaining unauthorized access to systems. The detection is implemented in Splunk using Sysmon events and is focused on various event codes that indicate potential Mimikatz activity, particularly looking for associated processes and high integrity level actions. The logic includes monitoring for specific process names like 'mimikatz' and 'lsass.exe', as well as the execution of commands that are typically associated with credential dumping activities. Additionally, the rule accounts for known threat actor groups and malware families that have been associated with the use of Mimikatz, enhancing its relevance in threat detection.
Categories
- Endpoint
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1003.001
- T1550.002
- T1552.002
- T1003.006
- T1003.004
- T1003.002
- T1558.002
- T1558.001
Created: 2024-02-09