mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-07 09:48:58 +00:00
24 lines
900 B
YAML
24 lines
900 B
YAML
title: LSASS Access Detected via Attack Surface Reduction
|
|
description: Detects Access to LSASS Process
|
|
status: experimental
|
|
references:
|
|
- https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard?WT.mc_id=twitter
|
|
author: Markus Neis
|
|
date: 2018/08/26
|
|
tags:
|
|
- attack.credential_access
|
|
- attack.t1003
|
|
# Defender Attack Surface Reduction
|
|
logsource:
|
|
product: windows_defender
|
|
definition: 'Requirements:Enabled Block credential stealing from the Windows local security authority subsystem (lsass.exe) from Attack Surface Reduction (GUID: 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2)'
|
|
detection:
|
|
selection:
|
|
EventID: 1121
|
|
Path: '*\lsass.exe'
|
|
condition: selection
|
|
falsepositives:
|
|
- Google Chrome GoogleUpdate.exe
|
|
- Some Taskmgr.exe related activity
|
|
level: high
|