2017-02-16 17:02:26 +00:00
title : Mimikatz Detection LSASS Access
status : experimental
2019-06-12 09:13:31 +00:00
description : Detects process access to LSASS which is typical for Mimikatz (0x1000 PROCESS_QUERY_ LIMITED_INFORMATION, 0x0400 PROCESS_QUERY_ INFORMATION "only old versions", 0x0010 PROCESS_VM_READ)
2019-11-04 01:26:34 +00:00
author : Florian Roth, Roberto Rodriguez, Dimitrios Slamaris, Mark Russinovich, Thomas Patzke, Teymur Kheirkhabarov, Sherif Eldeeb, James Dickenson, oscd.community (update)
date : 2017 /02/16
modified : 2019 /11/01
2018-01-27 23:24:16 +00:00
references :
- https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow
2019-06-12 09:13:31 +00:00
- https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html
2019-11-04 01:26:34 +00:00
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
2018-07-27 04:15:07 +00:00
tags :
2018-09-20 10:44:44 +00:00
- attack.t1003
2018-07-27 04:15:07 +00:00
- attack.s0002
- attack.credential_access
2019-06-14 04:15:38 +00:00
- car.2019-04-004
2017-02-18 23:31:59 +00:00
logsource :
2017-03-13 08:23:08 +00:00
product : windows
service : sysmon
2017-02-16 17:02:26 +00:00
detection :
selection :
2017-10-18 13:12:29 +00:00
EventID : 10
2019-11-04 01:26:34 +00:00
TargetImage : '*\lsass.exe'
GrantedAccess|contains :
- '0x40'
- '0x1000'
- '0x1400'
- '0x100000'
- '0x1410' # car.2019-04-004
- '0x1010' # car.2019-04-004
- '0x1438' # car.2019-04-004
- '0x143a' # car.2019-04-004
- '0x1418' # car.2019-04-004
filter :
ProcessName :
- '*\wmiprvse.exe'
- '*\taskmgr.exe'
- '*\procexp64.exe'
- '*\procexp.exe'
- '*\lsm.exe'
- '*\csrss.exe'
- '*\wininit.exe'
- '*\vmtoolsd.exe'
condition : selection and not filter
2017-02-16 17:02:26 +00:00
falsepositives :
2019-11-04 01:26:34 +00:00
- Legitimate software accessing LSASS process for legitimate reason; update the whitelist with it
level : high