title: Password Dumper Remote Thread in LSASS description: Detects password dumper activity by monitoring remote thread creation EventID 8 in combination with the lsass.exe process as TargetImage. The process in field Process is the malicious program. A single execution can lead to hundreds of events. references: - https://jpcertcc.github.io/ToolAnalysisResultSheet/details/WCE.htm status: stable author: Thomas Patzke logsource: product: windows service: sysmon detection: selection: EventID: 8 TargetImage: 'C:\Windows\System32\lsass.exe' StartModule: null condition: selection tags: - attack.credential_access - attack.t1003 - attack.s0005 falsepositives: - unknown level: high