SigmaHQ/rules/windows/sysmon/sysmon_password_dumper_lsass.yml
2018-07-17 23:58:11 +02:00

23 lines
744 B
YAML

title: Password Dumper Remote Thread in LSASS
description: Detects password dumper activity by monitoring remote thread creation EventID 8 in combination with the lsass.exe process as TargetImage. The process in field Process is the malicious program. A single execution can lead to hundreds of events.
references:
- https://jpcertcc.github.io/ToolAnalysisResultSheet/details/WCE.htm
status: stable
author: Thomas Patzke
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 8
TargetImage: 'C:\Windows\System32\lsass.exe'
StartModule: null
condition: selection
tags:
- attack.credential_access
- attack.t1003
- attack.s0005
falsepositives:
- unknown
level: high