u/manishrawat21

My First Sigma Detection Rule: LSASS Access

My First Sigma Detection Rule: LSASS Access

Recently I've been analyzing an APT attack dataset. I encountered some advanced methods of how APTs get into a system, how they maintain persistence, perform lateral movement, and execute payloads.
While working on this dataset, it took me days to understand techniques that attackers can execute in seconds. So I thought, why not create Sigma detection rules for threats that look legitimate but carry malicious intent?
So, here am I with my first detection rule, "Suspicious Process Access to LSASS with Full Permissions."

What it does

- Detects Powershell.exe or cmd.exe accessing lsass.exe with full or near full access rights, indicating potential credential dumping activity.

Possible False Positive

- Security monitoring tools
- Administrative Powershell scripts performing legitimate system checks

What I did
- Created and validated the Sigma rule
- Converted it into SPL
- Tested it successfully

Rule Link
- You can find it on my github

I’ll be adding more detection rules soon.

Feedback
- If you have suggestions or improvements, I’d really like to hear them.
And if you’re working on similar detections, feel free to connect.

u/manishrawat21 — 5 days ago