Detecting Suspicious LSASS Access + Template String Example

Rule Description
This rule is meant to provide an example of using a template in a report name (see Respond block below) to extract key fields from within the event that triggered the detection. Read more about template strings in our docs.

The detection logic could also inspire on how to operationalize the SENSITIVE_PROCESS_ACCESS event to look for unusual behaviors akin to credential theft tools such as mimikatz, and similar.

You’d first want to baseline this activity in your environment, then use this baseline to inform the SOURCE exclusions outlined in the Detect logic below.

Example baseline LCQL Query
-24h | * | SENSITIVE_PROCESS_ACCESS | event/*/event/TARGET/FILE_PATH contains "lsass" | ts as Timestamp event/*/event/SOURCE/FILE_PATH as SOURCE  event/*/event/TARGET/FILE_PATH as TARGET

Detect

event: SENSITIVE_PROCESS_ACCESS
op: and
rules:
  - op: ends with
    path: event/*/event/TARGET/FILE_PATH
    value: lsass.exe
    case sensitive: false
  - op: ends with
    not: true
    path: event/*/event/SOURCE/FILE_PATH
    value: system32\MRT.exe
    case sensitive: false
  - op: ends with
    not: true
    path: event/*/event/SOURCE/FILE_PATH
    value: system32\csrss.exe
    case sensitive: false
  - op: ends with
    not: true
    path: event/*/event/SOURCE/FILE_PATH
    value: windows\sysmon.exe
    case sensitive: false

Respond

- action: report
  name: Suspicious LSASS Access by {{ index (index .event.EVENTS 1) "event" "SOURCE" "FILE_PATH" }}

Notice template string within report name, which will evaluate to the SOURCE PROCESS of the activity


Test Event Target(s)

{
  "event": {
    "EVENTS": [
      {
        "event": {
          "BASE_ADDRESS": 140700034269184,
          "COMMAND_LINE": "C:\\Windows\\system32\\lsass.exe",
          "CREATION_TIME": 1739810602801,
          "FILE_IS_SIGNED": 1,
          "FILE_PATH": "C:\\Windows\\system32\\lsass.exe",
          "HASH": "e69356111240657e6435edf2e3a4bbac9c89957ef2d34fc620b8b7dbf564a862",
          "MEMORY_USAGE": 24686592,
          "PARENT": {
            "FILE_IS_SIGNED": 1,
            "FILE_PATH": "\\Device\\HarddiskVolume3\\Windows\\System32\\wininit.exe",
            "HASH": "fe7a0b26e504062b3a424d540e3f1f5cab8f2db5a421fbbb8b779122d11bd2af",
            "MEMORY_USAGE": 7094272,
            "PARENT_PROCESS_ID": 408,
            "PROCESS_ID": 484,
            "THIS_ATOM": "f756455a8e2bb5340f959ade67b36b38",
            "THREADS": 1,
            "TIMESTAMP": 1739811640783,
            "USER_NAME": "NT AUTHORITY\\SYSTEM"
          },
          "PARENT_PROCESS_ID": 484,
          "PROCESS_ID": 648,
          "THREADS": 10,
          "USER_NAME": "NT AUTHORITY\\SYSTEM"
        },
        "routing": {
          "arch": 2,
          "did": "",
          "event_id": "c92d5fd6-15e5-4b8d-8d76-ec6197002f33",
          "event_time": 1739811640968,
          "event_type": "EXISTING_PROCESS",
          "ext_ip": "35.202.185.98",
          "hostname": "it-01.initechsw.com",
          "iid": "977077fa-c52c-408b-b04e-f97902114203",
          "int_ip": "10.127.0.101",
          "moduleid": 2,
          "oid": "7a6d3e19-62a6-428b-ae26-fb0ba8ca7f33",
          "parent": "f756455a8e2bb5340f959ade67b36b38",
          "plat": 268435456,
          "sid": "b7ef0b6b-4576-493b-b24b-6c39f3146f69",
          "tags": [
            "windows"
          ],
          "this": "12f114c34764cd0cffeed85767b36b38"
        }
      },
      {
        "event": {
          "ACCESS_FLAGS": 4112,
          "PARENT_PROCESS_ID": 60,
          "PROCESS_ID": 648,
          "SOURCE": {
            "BASE_ADDRESS": 140700137619456,
            "COMMAND_LINE": "C:\\Windows\\system32\\rundll32.exe",
            "FILE_IS_SIGNED": 1,
            "FILE_PATH": "C:\\Windows\\system32\\rundll32.exe",
            "HASH": "b53f3c0cd32d7f20849850768da6431e5f876b7bfa61db0aa0700b02873393fa",
            "MEMORY_USAGE": 8998912,
            "PARENT_ATOM": "e59863191bb4e05b5fac859967b4d29d",
            "PARENT_PROCESS_ID": 10652,
            "PROCESS_ID": 60,
            "THIS_ATOM": "7a7bffbf9e27db4f6af8dca267b50ae8",
            "THREADS": 3,
            "TIMESTAMP": 1739918056451,
            "USER_NAME": "INITECHSW\\Lewis.Douglas"
          },
          "TARGET": {
            "BASE_ADDRESS": 140700034269184,
            "COMMAND_LINE": "C:\\Windows\\system32\\lsass.exe",
            "CREATION_TIME": 1739810602801,
            "FILE_IS_SIGNED": 1,
            "FILE_PATH": "C:\\Windows\\system32\\lsass.exe",
            "HASH": "e69356111240657e6435edf2e3a4bbac9c89957ef2d34fc620b8b7dbf564a862",
            "MEMORY_USAGE": 24686592,
            "PARENT_ATOM": "f756455a8e2bb5340f959ade67b36b38",
            "PARENT_PROCESS_ID": 484,
            "PROCESS_ID": 648,
            "THIS_ATOM": "12f114c34764cd0cffeed85767b36b38",
            "THREADS": 10,
            "TIMESTAMP": 1739811640968,
            "USER_NAME": "NT AUTHORITY\\SYSTEM"
          }
        },
        "routing": {
          "arch": 2,
          "did": "",
          "event_id": "13194933-bbeb-41d4-b528-a264baf27a6c",
          "event_time": 1739918057071,
          "event_type": "REMOTE_PROCESS_HANDLE",
          "ext_ip": "35.202.185.98",
          "hostname": "it-01.initechsw.com",
          "iid": "977077fa-c52c-408b-b04e-f97902114203",
          "int_ip": "10.127.0.101",
          "moduleid": 2,
          "oid": "7a6d3e19-62a6-428b-ae26-fb0ba8ca7f33",
          "parent": "7a7bffbf9e27db4f6af8dca267b50ae8",
          "plat": 268435456,
          "sid": "b7ef0b6b-4576-493b-b24b-6c39f3146f69",
          "tags": [
            "windows"
          ],
          "target": "12f114c34764cd0cffeed85767b36b38",
          "this": "9952ffddfc694e59677b320567b50ae9"
        }
      }
    ]
  },
  "routing": {
    "arch": 2,
    "did": "",
    "event_id": "5dbcfd80-0dc0-4efb-944a-e96347184827",
    "event_time": 1739918057892,
    "event_type": "SENSITIVE_PROCESS_ACCESS",
    "ext_ip": "35.202.185.98",
    "hostname": "it-01.initechsw.com",
    "iid": "977077fa-c52c-408b-b04e-f97902114203",
    "int_ip": "10.127.0.101",
    "moduleid": 2,
    "oid": "7a6d3e19-62a6-428b-ae26-fb0ba8ca7f33",
    "parent": "7a7bffbf9e27db4f6af8dca267b50ae8",
    "plat": 268435456,
    "sid": "b7ef0b6b-4576-493b-b24b-6c39f3146f69",
    "tags": [
      "windows"
    ],
    "target": "12f114c34764cd0cffeed85767b36b38",
    "this": "dea09b614788986f6d2781ec67b50ae9"
  },
  "ts": "2025-02-18 22:34:17"
}