EXPLORE
← Back to Explore
sigmamediumHunting

Unsigned Image Loaded Into LSASS Process

Loading unsigned image (DLL, EXE) into LSASS process

MITRE ATT&CK

credential-access

Detection Query

selection:
  Image|endswith: \lsass.exe
  Signed: "false"
condition: selection

Author

Teymur Kheirkhabarov, oscd.community

Created

2019-10-22

Data Sources

windowsImage Load Events

Platforms

windows

Tags

attack.credential-accessattack.t1003.001
Raw Content
title: Unsigned Image Loaded Into LSASS Process
id: 857c8db3-c89b-42fb-882b-f681c7cf4da2
status: test
description: Loading unsigned image (DLL, EXE) into LSASS process
references:
    - https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
author: Teymur Kheirkhabarov, oscd.community
date: 2019-10-22
modified: 2021-11-27
tags:
    - attack.credential-access
    - attack.t1003.001
logsource:
    category: image_load
    product: windows
detection:
    selection:
        Image|endswith: '\lsass.exe'
        Signed: 'false'
    condition: selection
falsepositives:
    - Valid user connecting using RDP
level: medium