SigmaHQ/rules/windows/sysmon/sysmon_password_dumper_lsass.yml
2017-02-12 16:33:09 +01:00

16 lines
587 B
YAML

title: Password Dumper Remote Thread in LSASS
description: Detects password dumper activity by monitoring remote thread creation EventID 8 in combination with the lsass.exe process as TargetImage. The process in field Process is the malicious program. A single execution can lead to hundrets of events.
reference: Internal research
detection:
selection:
- EventLog: Microsoft-Windows-Sysmon/Operational
EventID: 8
TargetProcess: 'C:\Windows\System32\lsass.exe'
StartModule: ''
condition: selection
falsepositives:
- unknown
level: 80