Detectionhightest
Lsass Full Dump Request Via DumpType Registry Settings
Detects the setting of the "DumpType" registry value to "2" which stands for a "Full Dump". Technique such as LSASS Shtinkering requires this value to be "2" in order to dump LSASS.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
WindowsRegistry Set
ProductWindows← raw: windows
CategoryRegistry Set← raw: registry_set
Detection Logic
Detection Logic1 selector
detection:
selection:
TargetObject|contains:
- '\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\DumpType'
- '\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\lsass.exe\DumpType'
Details: 'DWORD (0x00000002)' # Full Dump
condition: selectionFalse Positives
Legitimate application that needs to do a full dump of their process
MITRE ATT&CK
Tactics
Sub-techniques
Rule Metadata
Rule ID
33efc23c-6ea2-4503-8cfe-bdf82ce8f719
Status
test
Level
high
Type
Detection
Created
Thu Dec 08
Modified
Thu Aug 17
Author
Path
rules/windows/registry/registry_set/registry_set_lsass_usermode_dumping.yml
Raw Tags
attack.credential-accessattack.t1003.001