SigmaHQ/rules/windows/builtin/win_lsass_access_non_system_account.yml
Thomas Patzke 8d6a507ec4 OSCD QA wave 1
* Checked all rules against Mordor and EVTX samples datasets
* Added field names
* Some severity adjustments
* Fixes
2020-01-11 00:11:27 +01:00

34 lines
940 B
YAML

title: LSASS Access from Non System Account
id: 962fe167-e48d-4fd6-9974-11e5b9a5d6d1
description: Detects potential mimikatz-like tools accessing LSASS from non system account
status: experimental
date: 2019/06/20
modified: 2019/11/10
author: Roberto Rodriguez @Cyb3rWard0g
references:
- https://github.com/Cyb3rWard0g/ThreatHunter-Playbook/tree/master/playbooks/windows/06_credential_access/T1003_credential_dumping/lsass_access_non_system_account.md
tags:
- attack.credential_access
- attack.t1003
logsource:
product: windows
service: security
detection:
selection:
EventID:
- 4663
- 4656
ObjectType: 'Process'
ObjectName|endswith: '\lsass.exe'
filter:
SubjectUserName|endswith: '$'
condition: selection and not filter
fields:
- ComputerName
- ObjectName
- SubjectUserName
- ProcessName
falsepositives:
- Unknown
level: critical