Unsigned Image Loaded By LSASS

Description

This search detects loading of unsigned images by LSASS. Deprecated because too noisy.

Content Mapping

This content is not mapped to any local saved search. Add mapping


Use Case

Advanced Threat Detection

Category

Adversary Tactics,

Alert Volume

This search detects loading of unsigned images by LSASS. Deprecated because too noisy.

SPL Difficulty

None

Journey

Stage 3

MITRE ATT&CK Tactics

Credential Access

MITRE ATT&CK Techniques

OS Credential Dumping

LSASS Memory

MITRE Threat Groups

APT1
APT28
APT3
APT32
APT33
APT39
APT41
BRONZE BUTLER
Blue Mockingbird
Cleaver
FIN6
FIN8
Ke3chang
Lazarus Group
Leafminer
Leviathan
Magic Hound
MuddyWater
OilRig
PLATINUM
Sandworm Team
Silence
Soft Cell
Stolen Pencil
TEMP.Veles
Threat Group-3390
Whitefly

Kill Chain Phases

Actions On Objectives

Data Sources

Endpoint Detection and Response

   Help

Unsigned Image Loaded By LSASS Help

This search needs Sysmon Logs with a sysmon configuration, which includes EventCode 7 with lsass.exe. This search uses an input macro named sysmon. We strongly recommend that you specify your environment-specific configurations (index, source, sourcetype, etc.) for Windows Sysmon logs. Replace the macro definition with configurations for your Splunk environment. The search also uses a post-filter macro designed to filter out known false positives.

   Search

Open in Search