Detectionhightest

Lsass Full Dump Request Via DumpType Registry Settings

Detects the setting of the "DumpType" registry value to "2" which stands for a "Full Dump". Technique such as LSASS Shtinkering requires this value to be "2" in order to dump LSASS.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
@pbssubhashCreated Thu Dec 08Updated Thu Aug 1733efc23c-6ea2-4503-8cfe-bdf82ce8f719windows
Log Source
WindowsRegistry Set
ProductWindows← raw: windows
CategoryRegistry Set← raw: registry_set
Detection Logic
Detection Logic1 selector
detection:
    selection:
        TargetObject|contains:
            - '\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\DumpType'
            - '\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\lsass.exe\DumpType'
        Details: 'DWORD (0x00000002)' # Full Dump
    condition: selection
False Positives

Legitimate application that needs to do a full dump of their process

Rule Metadata
Rule ID
33efc23c-6ea2-4503-8cfe-bdf82ce8f719
Status
test
Level
high
Type
Detection
Created
Thu Dec 08
Modified
Thu Aug 17
Path
rules/windows/registry/registry_set/registry_set_lsass_usermode_dumping.yml
Raw Tags
attack.credential-accessattack.t1003.001
View on GitHub