← Back to Explore
sigmahighHunting
HackTool - HandleKatz LSASS Dumper Execution
Detects the use of HandleKatz, a tool that demonstrates the usage of cloned handles to Lsass in order to create an obfuscated memory dump of the same
Detection Query
selection_loader_img:
Image|endswith: \loader.exe
CommandLine|contains: "--pid:"
selection_loader_imphash:
Hashes|contains:
- IMPHASH=38D9E015591BBFD4929E0D0F47FA0055
- IMPHASH=0E2216679CA6E1094D63322E3412D650
selection_flags:
CommandLine|contains|all:
- "--pid:"
- "--outfile:"
CommandLine|contains:
- .dmp
- lsass
- .obf
- dump
condition: 1 of selection_*
Author
Florian Roth (Nextron Systems)
Created
2022-08-18
Data Sources
windowsProcess Creation Events
Platforms
windows
Tags
attack.credential-accessattack.t1003.001
Raw Content
title: HackTool - HandleKatz LSASS Dumper Execution
id: ca621ba5-54ab-4035-9942-d378e6fcde3c
status: test
description: Detects the use of HandleKatz, a tool that demonstrates the usage of cloned handles to Lsass in order to create an obfuscated memory dump of the same
references:
- https://github.com/codewhitesec/HandleKatz
author: Florian Roth (Nextron Systems)
date: 2022-08-18
modified: 2024-11-23
tags:
- attack.credential-access
- attack.t1003.001
logsource:
category: process_creation
product: windows
detection:
selection_loader_img:
Image|endswith: '\loader.exe'
CommandLine|contains: '--pid:'
selection_loader_imphash:
Hashes|contains:
- 'IMPHASH=38D9E015591BBFD4929E0D0F47FA0055'
- 'IMPHASH=0E2216679CA6E1094D63322E3412D650'
selection_flags:
CommandLine|contains|all:
- '--pid:'
- '--outfile:'
CommandLine|contains:
- '.dmp'
- 'lsass'
- '.obf'
- 'dump'
condition: 1 of selection_*
falsepositives:
- Unknown
level: high