T1003.001 OSCredentialDumping LSASSMemory
T1003.001 - OS Credential Dumping LSASS Memory¶
DESCRIPTION¶
A technique by which the adversary may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password.
Example:
procdump -ma lsass.exe lsass_dump\ rundll32.exe C:\Windows\System32\comsvcs.dll, MiniDump 552 C:\Windows\Temp\vmware-vhost.dmp full
Related
Volt Typhoon activity
Reference:¶
https://www.microsoft.com/en-us/security/blog/2022/10/05/detecting-and-preventing-lsass-credential-dumping-attacks
https://www.cyber.gov.au/about-us/advisories/prc-state-sponsored-cyber-actor-living-off-the-land-to-evade-detection
https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Windows%20Security%20Events/Hunting%20Queries/SuspectedLSASSDump.yaml
https://docs.microsoft.com/sysinternals/downloads/procdump
ATT&CK TACTICS¶
T1003.001 -
OS Credential Dumping:
LSASS Memory
T1003.003 -
OS Credential Dumping:
NTDS
Data Source(s): Process, Command
SENTINEL RULE QUERY¶
Triage¶
- Inspect which account and at what time the activity was performed
- Question the user if the activity was expected and approved
FalsePositive¶
Legitimate administrative or pentesting activity
VERSION¶
Version 1.0 (date: 10/07/2023)