Skip to content

Commit 24b19b2

Browse files
committed
feat(rules): Add Potential LSA secrets registry dumping rule
Identifies potential dumping of LSA secrets by suspicious processes that access sensitive SECURITY registry hives associated with cached credentials and LSA secret storage. This behavior is commonly observed in credential dumping utilities attempting to extract plaintext secrets, service credentials, or cached domain credentials from the Local Security Authority.
1 parent 2eab2d5 commit 24b19b2

File tree

1 file changed

+54
-0
lines changed

1 file changed

+54
-0
lines changed
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
name: Potential LSA secrets registry dumping
2+
id: e5e95cbe-c8ab-418c-abe3-539d70a0b0af
3+
version: 1.0.0
4+
description: |
5+
Identifies potential dumping of LSA secrets by suspicious processes that access
6+
sensitive SECURITY registry hives associated with cached credentials and LSA secret
7+
storage.
8+
This behavior is commonly observed in credential dumping utilities attempting to
9+
extract plaintext secrets, service credentials, or cached domain credentials from
10+
the Local Security Authority.
11+
labels:
12+
tactic.id: TA0006
13+
tactic.name: Credential Access
14+
tactic.ref: https://attack.mitre.org/tactics/TA0006/
15+
technique.id: T1003
16+
technique.name: OS Credential Dumping
17+
technique.ref: https://attack.mitre.org/techniques/T1003/
18+
subtechnique.id: T1003.004
19+
subtechnique.name: LSA secrets
20+
subtechnique.ref: https://attack.mitre.org/techniques/T1003/004/
21+
references:
22+
- https://github.com/almounah/silp
23+
24+
condition: >
25+
sequence
26+
maxspan 10m
27+
by ps.uuid
28+
|spawn_process and
29+
ps.token.integrity_level not in ('LOW', 'MEDIUM') and
30+
ps.exe not imatches
31+
(
32+
'?:\\Windows\\regedit.exe',
33+
'?:\\Program Files\\*',
34+
'?:\\Program Files (x86)\\*',
35+
'?:\\Windows\\System32\\lsass.exe'
36+
)
37+
|
38+
|open_registry and
39+
registry.path imatches
40+
(
41+
'HKEY_LOCAL_MACHINE\\SECURITY\\CACHE\\*',
42+
'HKEY_LOCAL_MACHINE\\SECURITY\\Policy\\Secrets\\*'
43+
) and
44+
registry.path not imatches
45+
(
46+
'HKEY_LOCAL_MACHINE\\SECURITY\\Policy\\Secrets\\$MACHINE.ACC\\CupdTime\\*'
47+
)
48+
|
49+
action:
50+
- name: kill
51+
52+
severity: critical
53+
54+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)