Detectionhighstable

Potential LSASS Process Dump Via Procdump

Detects potential credential harvesting attempts through LSASS memory dumps using ProcDump. This rule identifies suspicious command-line patterns that combine memory dump flags (-ma, -mm, -mp) with LSASS-related process markers. LSASS (Local Security Authority Subsystem Service) contains sensitive authentication data including plaintext passwords, NTLM hashes, and Kerberos tickets in memory. Attackers commonly dump LSASS memory to extract credentials for lateral movement and privilege escalation.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Florian Roth (Nextron Systems)Created Tue Oct 30Updated Sun Oct 195afee48e-67dd-4e03-a783-f74259dcf998windows
Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation

Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.

Detection Logic
Detection Logic2 selectors
detection:
    selection_flags:
        CommandLine|contains|windash:
            - ' -ma '
            - ' -mm ' # Mini dump
            - ' -mp ' # Miniplus dump
    selection_process:
        CommandLine|contains:
            - ' ls' # Short for lsass
            - ' keyiso'
            - ' samss'
    condition: all of selection_*
False Positives

Unlikely, because no one should dump an lsass process memory

Another tool that uses command line flags similar to ProcDump

MITRE ATT&CK

CAR Analytics

2013-05-009 · CAR 2013-05-009
Rule Metadata
Rule ID
5afee48e-67dd-4e03-a783-f74259dcf998
Status
stable
Level
high
Type
Detection
Created
Tue Oct 30
Modified
Sun Oct 19
Path
rules/windows/process_creation/proc_creation_win_sysinternals_procdump_lsass.yml
Raw Tags
attack.defense-evasionattack.t1036attack.credential-accessattack.t1003.001car.2013-05-009
View on GitHub