Access LSASS Memory For Dump Creation

Description

Detect memory dumping of the LSASS process.

Content Mapping

This content has been mapped to the local saved search:

  • IndexerLevel - Maximum memory utilisation per search [Remove]


Use Case

Advanced Threat Detection

Category

Adversary Tactics,

Alert Volume

Detect memory dumping of the LSASS process.

SPL Difficulty

None

Journey

Stage 3

MITRE ATT&CK Tactics

Credential Access

MITRE ATT&CK Techniques

OS Credential Dumping

LSASS Memory

MITRE Threat Groups

APT1
APT28
APT3
APT32
APT33
APT39
APT41
BRONZE BUTLER
Blue Mockingbird
Cleaver
FIN6
FIN8
Ke3chang
Lazarus Group
Leafminer
Leviathan
Magic Hound
MuddyWater
OilRig
PLATINUM
Sandworm Team
Silence
Soft Cell
Stolen Pencil
TEMP.Veles
Threat Group-3390
Whitefly

Kill Chain Phases

Actions On Objectives

Data Sources

Endpoint Detection and Response

   Help

Access LSASS Memory For Dump Creation Help

This search requires Sysmon Logs and a Sysmon configuration, which includes EventCode 10 for lsass.exe. This search uses an input macro named sysmon. We strongly recommend that you specify your environment-specific configurations (index, source, sourcetype, etc.) for Windows Sysmon logs. Replace the macro definition with configurations for your Splunk environment. The search also uses a post-filter macro designed to filter out known false positives.

   Search

Open in Search