Windows credential dumping via WER application error

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects Windows Error Reporting events triggered by Local Security Authority Subsystem Service (LSASS) crashes indicative of active credential dumping attempts.

Strategy

This rule monitors Application Error events with event ID 1000 where @Event.EventData.Data.Application is lsass.exe and @Event.EventData.Data.ExceptionCode is c0000001.

LSASS stores authentication credentials and security tokens in memory. Credential dumping tools often interact with LSASS memory in ways that cause access violations, resulting in process crashes with specific exception codes.

Triage & Response

  • Examine the Application event logs on {{host}} for details about the LSASS crash.
  • Review process execution history for credential dumping tools like Mimikatz.
  • Check for unauthorized authentication attempts using potentially extracted credentials.
  • Identify any lateral movement attempts from {{host}}.
  • Capture memory dumps if available for forensic analysis.
  • Force password resets for all accounts accessed on the affected system.