2020-01-10 23:11:27 +00:00
|
|
|
title: LSASS Access from Non System Account
|
2019-12-19 22:56:36 +00:00
|
|
|
id: 962fe167-e48d-4fd6-9974-11e5b9a5d6d1
|
2019-11-10 15:43:41 +00:00
|
|
|
description: Detects potential mimikatz-like tools accessing LSASS from non system account
|
|
|
|
status: experimental
|
|
|
|
date: 2019/06/20
|
2021-03-18 08:04:03 +00:00
|
|
|
modified: 2021/03/17
|
2019-11-10 15:43:41 +00:00
|
|
|
author: Roberto Rodriguez @Cyb3rWard0g
|
|
|
|
references:
|
2021-05-22 03:57:01 +00:00
|
|
|
- https://threathunterplaybook.com/notebooks/windows/06_credential_access/WIN-170105221010.html
|
2019-11-10 15:43:41 +00:00
|
|
|
tags:
|
|
|
|
- attack.credential_access
|
2020-08-24 23:09:17 +00:00
|
|
|
- attack.t1003 # an old one
|
2020-06-16 20:46:08 +00:00
|
|
|
- attack.t1003.001
|
2019-11-10 15:43:41 +00:00
|
|
|
logsource:
|
|
|
|
product: windows
|
|
|
|
service: security
|
|
|
|
detection:
|
2020-06-16 20:46:08 +00:00
|
|
|
selection:
|
2019-11-10 15:43:41 +00:00
|
|
|
EventID:
|
|
|
|
- 4663
|
|
|
|
- 4656
|
2021-03-10 17:56:05 +00:00
|
|
|
AccessMask:
|
2021-03-10 17:51:27 +00:00
|
|
|
- '0x40'
|
|
|
|
- '0x1400'
|
|
|
|
- '0x1000'
|
|
|
|
- '0x100000'
|
|
|
|
- '0x1410' # car.2019-04-004
|
|
|
|
- '0x1010' # car.2019-04-004
|
|
|
|
- '0x1438' # car.2019-04-004
|
|
|
|
- '0x143a' # car.2019-04-004
|
|
|
|
- '0x1418' # car.2019-04-004
|
|
|
|
- '0x1f0fff'
|
|
|
|
- '0x1f1fff'
|
|
|
|
- '0x1f2fff'
|
|
|
|
- '0x1f3fff'
|
2021-03-10 17:56:05 +00:00
|
|
|
- '40'
|
|
|
|
- '1400'
|
|
|
|
- '1000'
|
|
|
|
- '100000'
|
|
|
|
- '1410' # car.2019-04-004
|
|
|
|
- '1010' # car.2019-04-004
|
|
|
|
- '1438' # car.2019-04-004
|
|
|
|
- '143a' # car.2019-04-004
|
|
|
|
- '1418' # car.2019-04-004
|
|
|
|
- '1f0fff'
|
|
|
|
- '1f1fff'
|
|
|
|
- '1f2fff'
|
|
|
|
- '1f3fff'
|
2019-11-10 15:43:41 +00:00
|
|
|
ObjectType: 'Process'
|
|
|
|
ObjectName|endswith: '\lsass.exe'
|
2021-03-18 08:04:03 +00:00
|
|
|
filter1:
|
2019-11-10 15:43:41 +00:00
|
|
|
SubjectUserName|endswith: '$'
|
2021-03-18 08:04:03 +00:00
|
|
|
filter2:
|
|
|
|
ProcessName|startswith: 'C:\Program Files' # too many false positives with legitimate AV and EDR solutions
|
|
|
|
condition: selection and not filter1 and not filter2
|
2020-01-10 23:11:27 +00:00
|
|
|
fields:
|
|
|
|
- ComputerName
|
|
|
|
- ObjectName
|
|
|
|
- SubjectUserName
|
|
|
|
- ProcessName
|
2019-11-10 15:43:41 +00:00
|
|
|
falsepositives:
|
|
|
|
- Unknown
|
2020-01-10 23:11:27 +00:00
|
|
|
level: critical
|