PowerShell Get-Process LSASS in ScriptBlock

Last updated on:

Rule name

Rule type

Log sources

MITRE ATT&CK tags

Severity

PowerShell Get-Process LSASS in ScriptBlock

Standard

Windows

Credential Access: OS Credential Dumping - LSASS Memory (T1003.001)

Critical

About the rule

Rule Type

Standard

Rule Description

The Get-Process lsass command is commonly used by attackers to inspect the Local Security Authority Subsystem Service (LSASS), which stores sensitive credential material. While Get-Process by itself is benign, querying lsass often precedes credential dumping attempts using tools like Mimikatz or other in-memory exploits.

Severity

Trouble

Rule journey

Attack chain scenario

Admin account compromised → PowerShell execution → LSASS process queried → Credentials dumped → Lateral movement

Impact

  • Credential theft
  • Full domain compromise
  • Lateral movement

Rule Requirement

Prerequisites

Logon to Group Policy Management Console with administrative privileges and enable Module Logging for Windows PowerShell in the Group Policy Management Editor. Ensure to enter * in the Module Names window to record all modules. Similarly enable PowerShell Script Block Logging for Windows PowerShell. Finally, create a new registry key "Microsoft-Windows-Powershell/Operational" in the directory "Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\".

Criteria

Action1: actionname = "PowerShell Script Block Logged" AND SCRIPTEXECUTED contains "Get-Process lsass" select Action1.HOSTNAME,Action1.MESSAGE,Action1.SCRIPTEXECUTED

Detection

Execution Mode

realtime

Log Sources

Windows

MITRE ATT&CK

Credential Access: OS Credential Dumping - LSASS Memory (T1003.001)

Security Standards

Enabling this rule will help you meet the security standard's requirement listed below:

DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events.

When this rule is triggered, you're notified of a attempts to install or authorize access to PSWA. This enables you to restrict interactive logins for service and admin accounts.

Author

Florian Roth (Nextron Systems)

Future actions

Known False Positives

Legitimate certificate exports invoked by administrators or users (depends on processes in the environment - filter if unusable).

Next Steps

When this rule is triggered, the following measures can be implemented:

  1. Identification: Identify if the flagged event is a new incident or part of an existing incident.
  2. Analysis: Analyze the impact and extent of the incident to comprehend the severity of the attack using the Incident Workbench.
  3. Response: Respond promptly by initiating an automated workflow to interrupt the network connections and cease the malicious process.
  4. Audit PowerShell activities: Enable Script Block Logging and monitor for lsass references.

Mitigation

Mitigation ID

Mitigation Name

Mitigation description

M1040

Behavior Prevention on Endpoint

For Windows 10, enable Attack Surface Reduction (ASR) rules to secure LSASS and prevent credential stealing.

M1043

Credential Access Protection

On Windows 10, Microsoft introduced Credential Guard to protect LSA secrets that can be used for credential dumping. This feature is not configured by default and has specific hardware and firmware requirements. Note that it doesn't protect against all forms of credential dumping.

M1028

Operating System Configuration

Consider disabling or restricting NTLM and disabling WDigest authentication to reduce credential exposure.

M1027

Password Policies

Enforce complex and unique passwords for local administrator accounts across all systems in your network.

M1026

Privileged Account Management

Restrict privileges to execute PowerShell scripts to administrators and enforce limitations on the commands that can be executed via remote PowerShell sessions.

M1025

Privileged Process Integrity

On Windows 8.1 and Windows Server 2012 R2, enable Protected Process Light for LSA to enhance security.

M1017

User Training

Train users and administrators to avoid using the same password for multiple accounts to limit credential overlap across systems.