SigmaHQ/rules/windows/sysmon/sysmon_password_dumper_lsass.yml

18 lines
573 B
YAML
Raw Normal View History

2017-02-12 15:33:09 +00:00
title: Password Dumper Remote Thread in LSASS
description: Detects password dumper activity by monitoring remote thread creation EventID 8 in combination with the lsass.exe process as TargetImage. The process in field Process is the malicious program. A single execution can lead to hundrets of events.
author: Thomas Patzke
logsource:
product: windows
service: sysmon
2017-02-12 14:50:39 +00:00
detection:
selection:
EventID: 8
TargetProcess: 'C:\Windows\System32\lsass.exe'
StartModule: null
2017-02-12 14:50:39 +00:00
condition: selection
falsepositives:
- unknown
2017-02-16 17:02:26 +00:00
level: high
2017-02-12 15:33:09 +00:00