Techniques
Sample rules
Windows Non-System Account Targeting Lsass
- source: splunk
- technicques:
- T1003.001
- T1003
Description
The following analytic identifies non SYSTEM accounts requesting access to lsass.exe. This behavior may be related to credential dumping or applications requiring access to credentials. Triaging this event will require understanding the GrantedAccess from the SourceImage. In addition, whether the account is privileged or not. Review the process requesting permissions and review parallel processes.
Detection logic
`sysmon` EventCode=10 TargetImage=*lsass.exe NOT (SourceUser="NT AUTHORITY\\*")
| stats count min(_time) as firstTime max(_time) as lastTime by dest, parent_process_name, parent_process_path ,parent_process_id, TargetImage, GrantedAccess, SourceUser, TargetUser
| rename TargetUser as user
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)`
| `windows_non_system_account_targeting_lsass_filter`