
Summary
The detection rule 'Potential LSASS Memory Dump via PssCaptureSnapShot' identifies suspicious behavior related to unauthorized access of the LSASS (Local Security Authority Subsystem Service) handle through the Windows feature PssCaptureSnapShot. This rule becomes critical when the same process accesses two instances of LSASS, potentially indicating an attempt to evade detection while attempting to dump LSASS memory and extract sensitive credentials. The rule operates on Windows systems and leverages logs from Winlogbeat and Sysmon for detecting these instances. It uses a threshold-based approach, flagging occurrences where the same process accesses LSASS multiple times in a specified timeframe. The risk score of 73 designates this type of behavior as high-risk, warranting immediate investigation and remediation actions. The rule also outlines potential legitimate triggers that might lead to false positives, emphasizing the importance of context during incident investigation.
Categories
- Endpoint
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1003
- T1003.001
Created: 2021-10-14