
Summary
The rule identifies potential unauthorized access to sensitive credential material from the Local Security Authority Subsystem Service (LSASS) memory, which is a common target for credential dumping attacks. The detection logic specifically looks for Event IDs 4656, which indicate handle requests made to 'lsass.exe', and filters these requests, focusing on read operations made from memory. It also assesses process execution events to avoid false positives related to process injections. The security context includes an evaluation of process IDs to capture relevant information without relying on execution events as primary identifiers, thus allowing for detection of potentially covert credential access attempts. The rule leverages Splunk queries to extract, analyze, and summarize the required data within a 6-second window, ultimately revealing potential security risks. This guideline directly relates to threat techniques under credential access, notably addressing T1003.001 for LSASS memory dumping. The parameters set in the search include checks for the number of processes and event counts to restrict output to significant detections only.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Application Log
- Process
ATT&CK Techniques
- T1003.002
- T1003.001
Created: 2024-02-09