Detection Library
criticalstableWindowsEndpointT1003.001
LSASS Memory Dump via Task Manager or ProcDump
Detects attempts to dump LSASS process memory for credential harvesting using common tools.
Updated Oct 28, 2024 · Detection Engineering Team
lsasscredential-dumpingmimikatzwindows
Problem Statement
LSASS contains Windows credentials in memory. Dumping it allows offline cracking or pass-the-hash attacks. Tools like Mimikatz, ProcDump, and Task Manager are commonly used.
Sample Logs
{"EventID":10,"SourceImage":"C:\Users\attacker\procdump64.exe","TargetImage":"C:\Windows\System32\lsass.exe","GrantedAccess":"0x1fffff","CallTrace":"C:\Windows\SYSTEM32\ntdll.dll+..."}Required Fields
TargetImage
SourceImage
GrantedAccess
CallTrace
SourceProcessId
False Positives
- ·Antivirus solutions accessing LSASS
- ·Legitimate system tools from trusted paths
- ·EDR agents performing telemetry collection
Tuning Guidance
Baseline legitimate LSASS access patterns. Whitelist known AV/EDR process paths. Monitor CallTrace for unsigned modules.