Skip to content

Commit a72f48f

Browse files
committed
feat(rules): LSASS process clone creation via reflection
Identifies the creation of an LSASS clone process via RtlCreateProcessReflection API function. Adversaries can use this technique to dump credentials material from the LSASS fork and evade defenses.
1 parent 9ef00e5 commit a72f48f

File tree

1 file changed

+31
-0
lines changed

1 file changed

+31
-0
lines changed
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
name: LSASS process clone creation via reflection
2+
id: cdf3810a-4832-446a-ac9d-d108cf2e313c
3+
version: 1.0.0
4+
description: |
5+
Identifies the creation of an LSASS clone process via RtlCreateProcessReflection API function.
6+
Adversaries can use this technique to dump credentials material from the LSASS fork and evade
7+
defenses.
8+
labels:
9+
tactic.id: TA0006
10+
tactic.name: Credential Access
11+
tactic.ref: https://attack.mitre.org/tactics/TA0006/
12+
technique.id: T1003
13+
technique.name: OS Credential Dumping
14+
technique.ref: https://attack.mitre.org/techniques/T1003/
15+
subtechnique.id: T1003.001
16+
subtechnique.name: LSASS Memory
17+
subtechnique.ref: https://attack.mitre.org/techniques/T1003/001/
18+
references:
19+
- https://github.com/Offensive-Panda/LsassReflectDumping
20+
- https://s3cur3th1ssh1t.github.io/Reflective-Dump-Tools/
21+
22+
condition: >
23+
spawn_process and ps.name ~= 'lsass.exe' and ps.child.name ~= 'lsass.exe'
24+
and
25+
thread.callstack.symbols imatches ('ntdll.dll!RtlCloneUserProcess', 'ntdll.dll!RtlCreateProcessReflection')
26+
action:
27+
- name: kill
28+
29+
severity: high
30+
31+
min-engine-version: 2.2.0

0 commit comments

Comments
 (0)