Atomic Red Team

Description

Atomic Test Results: Successful Execution of test T1003.001-1 Windows Credential Editor Successful Execution of test T1003.001-2 Dump LSASS.exe Memory using ProcDump Return value unclear for test T1003.001-3 Dump LSASS.exe Memory using comsvcs.dll Successful Execution of test T1003.001-4 Dump LSASS.exe Memory using direct system calls and API unhooking Return value unclear for test T1003.001-6 Offline Credential Theft With Mimikatz Return value unclear for test T1003.001-7 LSASS read with pypykatz

MITRE ATT&CK Techniques

ID Technique Tactic
T1003.001 LSASS Memory Credential Access

Environment Details

Field Value
Environment attack_range
Directory atomic_red_team
Test Date 2022-01-12

Datasets

The following datasets were collected during this attack simulation:

Windows-Sysmon_creddump

  • Path: /datasets/attack_techniques/T1003.001/atomic_red_team/windows-sysmon_creddump.log
  • Sourcetype: XmlWinEventLog
  • Source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational

Procdump_windows-Security

  • Path: /datasets/attack_techniques/T1003.001/atomic_red_team/procdump_windows-security.log
  • Sourcetype: XmlWinEventLog
  • Source: XmlWinEventLog:Security

Crowdstrike_falcon

  • Path: /datasets/attack_techniques/T1003.001/atomic_red_team/crowdstrike_falcon.log
  • Sourcetype: crowdstrike:events:sensor
  • Source: crowdstrike

Createdump_windows-Sysmon

  • Path: /datasets/attack_techniques/T1003.001/atomic_red_team/createdump_windows-sysmon.log
  • Sourcetype: XmlWinEventLog
  • Source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational

Windows-Sysmon

  • Path: /datasets/attack_techniques/T1003.001/atomic_red_team/windows-sysmon.log
  • Sourcetype: XmlWinEventLog
  • Source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational

The following detections in our security content repository use this attack data for testing:

Detection Name Type Source MITRE ATT&CK Analytic Story
Dump LSASS via procdump TTP Endpoint T1003.001 CISA AA22-257A, HAFNIUM Group, Compromised Windows Host, Credential Dumping, Seashell Blizzard, Storm-2460 CLFS Zero Day Exploitation
Creation of lsass Dump with Taskmgr TTP Endpoint T1003.001 Credential Dumping, CISA AA22-257A, Cactus Ransomware, Seashell Blizzard, Scattered Lapsus$ Hunters
Access LSASS Memory for Dump Creation TTP Endpoint T1003.001 CISA AA23-347A, Credential Dumping, Cactus Ransomware, Lokibot, Scattered Lapsus$ Hunters
Detect Credential Dumping through LSASS access TTP Endpoint T1003.001 Detect Zerologon Attack, CISA AA23-347A, Credential Dumping, BlackSuit Ransomware, Lokibot, Scattered Lapsus$ Hunters
Create Remote Thread into LSASS TTP Endpoint T1003.001 Credential Dumping, BlackSuit Ransomware, Lokibot
Dump LSASS via comsvcs DLL TTP Endpoint T1003.001 Living Off The Land, CISA AA22-257A, Volt Typhoon, HAFNIUM Group, Prestige Ransomware, Suspicious Rundll32 Activity, Industroyer2, Data Destruction, Flax Typhoon, CISA AA22-264A, Compromised Windows Host, Credential Dumping, Scattered Lapsus$ Hunters, Hellcat Ransomware
Windows Credential Dumping LSASS Memory Createdump TTP Endpoint T1003.001 Compromised Windows Host, Credential Dumping, Scattered Lapsus$ Hunters
Windows Non-System Account Targeting Lsass TTP Endpoint T1003.001 CISA AA23-347A, Credential Dumping, Lokibot, Scattered Lapsus$ Hunters
Windows Hunting System Account Targeting Lsass Hunting Endpoint T1003.001 CISA AA23-347A, Credential Dumping, Lokibot, Scattered Lapsus$ Hunters
Windows Possible Credential Dumping TTP Endpoint T1003.001 Detect Zerologon Attack, CISA AA22-264A, Credential Dumping, CISA AA23-347A, DarkSide Ransomware, CISA AA22-257A, Scattered Lapsus$ Hunters

Usage Instructions

Replay with Splunk Attack Data

Replay attack data with replay.py from Splunk Attack Data.

1python replay.py --dataset /datasets/attack_techniques/T1003.001/atomic_red_team/windows-sysmon_creddump.log --index attack_data

Manual Import

  1. Download the dataset files from the paths listed above
  2. Configure your Splunk instance with the appropriate sourcetypes
  3. Import the logs using the Splunk Add Data wizard

Find more detections and analytics for this attack technique in our security content repository.


Source: GitHub | Version: 1.0