← Back to Explore
sigmamediumHunting
Unsigned Image Loaded Into LSASS Process
Loading unsigned image (DLL, EXE) into LSASS process
Detection Query
selection:
Image|endswith: \lsass.exe
Signed: "false"
condition: selection
Author
Teymur Kheirkhabarov, oscd.community
Created
2019-10-22
Data Sources
windowsImage Load Events
Platforms
windows
References
Tags
attack.credential-accessattack.t1003.001
Raw Content
title: Unsigned Image Loaded Into LSASS Process
id: 857c8db3-c89b-42fb-882b-f681c7cf4da2
status: test
description: Loading unsigned image (DLL, EXE) into LSASS process
references:
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
author: Teymur Kheirkhabarov, oscd.community
date: 2019-10-22
modified: 2021-11-27
tags:
- attack.credential-access
- attack.t1003.001
logsource:
category: image_load
product: windows
detection:
selection:
Image|endswith: '\lsass.exe'
Signed: 'false'
condition: selection
falsepositives:
- Valid user connecting using RDP
level: medium