LoFP LoFP / false positives will occur based on legitimate application requests, filter based on source image as needed.

Techniques

Sample rules

Windows Non-System Account Targeting Lsass

Description

The following analytic identifies non SYSTEM accounts requesting access to lsass.exe. This behavior may be related to credential dumping or applications requiring access to credentials. Triaging this event will require understanding the GrantedAccess from the SourceImage. In addition, whether the account is privileged or not. Review the process requesting permissions and review parallel processes.

Detection logic

`sysmon` EventCode=10 TargetImage=*lsass.exe NOT (SourceUser="NT AUTHORITY\\*") 
| stats count min(_time) as firstTime max(_time) as lastTime by dest, parent_process_name, parent_process_path ,parent_process_id, TargetImage, GrantedAccess, SourceUser, TargetUser 
| rename TargetUser as user 
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)` 
| `windows_non_system_account_targeting_lsass_filter`