Developing Sigma Rules
Overview
Example 1: Detecting LSASS Credential Dumping
LSASS Credential Dumping Detection Rule
title: LSASS Access with rare GrantedAccess flag
status: experimental
description: Detects process access to LSASS memory with suspicious access flag 0x1010
date: 2023/07/08
tags:
- attack.credential_access
- attack.t1003.001
logsource:
category: process_access
product: windows
detection:
selection:
TargetImage|endswith: '\lsass.exe'
GrantedAccess|endswith: '0x1010'
condition: selectionExample 2: Detecting Multiple Failed Logins from Single Source
Sigma Rule Development Resources
Last updated