Skip to content

Commit 1a8c1a0

Browse files
committed
feat(rules): Add Potential LSA secrets registry dumping rule
Identifies potential dumping of LSA secrets by suspicious processes that access sensitive SECURITY registry hives associated with cached credentials and LSA secret storage. This behavior is commonly observed in credential dumping utilities attempting to extract plaintext secrets, service credentials, or cached domain credentials from the Local Security Authority.
1 parent 2eab2d5 commit 1a8c1a0

1 file changed

Lines changed: 54 additions & 0 deletions

File tree

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
name: Potential LSA secrets registry dumping
2+
id: e5e95cbe-c8ab-418c-abe3-539d70a0b0af
3+
version: 1.0.0
4+
description: |
5+
Identifies potential dumping of LSA secrets by suspicious processes that access
6+
sensitive SECURITY registry hives associated with cached credentials and LSA secret
7+
storage.
8+
This behavior is commonly observed in credential dumping utilities attempting to
9+
extract plaintext secrets, service credentials, or cached domain credentials from
10+
the Local Security Authority.
11+
labels:
12+
tactic.id: TA0006
13+
tactic.name: Credential Access
14+
tactic.ref: https://attack.mitre.org/tactics/TA0006/
15+
technique.id: T1003
16+
technique.name: OS Credential Dumping
17+
technique.ref: https://attack.mitre.org/techniques/T1003/
18+
subtechnique.id: T1003.004
19+
subtechnique.name: LSA secrets
20+
subtechnique.ref: https://attack.mitre.org/techniques/T1003/004/
21+
references:
22+
- https://github.com/almounah/silp
23+
24+
condition: >
25+
sequence
26+
maxspan 10m
27+
|spawn_process and
28+
ps.token.integrity_level not in ('LOW', 'MEDIUM') and
29+
ps.exe not imatches
30+
(
31+
'?:\\Windows\\regedit.exe',
32+
'?:\\Program Files\\*',
33+
'?:\\Program Files (x86)\\*',
34+
'?:\\Windows\\System32\\lsass.exe'
35+
)
36+
| by ps.uuid
37+
|open_registry and
38+
ps.sid = 'S-1-5-18' and
39+
registry.path imatches
40+
(
41+
'HKEY_LOCAL_MACHINE\\SECURITY\\CACHE\\*',
42+
'HKEY_LOCAL_MACHINE\\SECURITY\\Policy\\Secrets\\*'
43+
) and
44+
registry.path not imatches
45+
(
46+
'HKEY_LOCAL_MACHINE\\SECURITY\\Policy\\Secrets\\$MACHINE.ACC\\CupdTime\\*'
47+
)
48+
| by ps.parent.uuid
49+
action:
50+
- name: kill
51+
52+
severity: critical
53+
54+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)