Techniques
Sample rules
Windows Hunting System Account Targeting Lsass
- source: splunk
- technicques:
- T1003.001
- T1003
Description
The following hunting analytic identifies all processes requesting access into Lsass.exe. his behavior may be related to credential dumping or applications requiring access to credentials. Triaging this event will require understanding the GrantedAccess from the SourceImage. In addition, whether the account is privileged or not. Review the process requesting permissions and review parallel processes.
Detection logic
`sysmon` EventCode=10 TargetImage=*lsass.exe
| stats count min(_time) as firstTime max(_time) as lastTime by dest, TargetImage, GrantedAccess, SourceImage, SourceProcessId, SourceUser, TargetUser
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)`
| `windows_hunting_system_account_targeting_lsass_filter`