Skip to content

Compcode1/lsass-memory-scraping

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 

Repository files navigation

🧠 Host-Based Credential Dumping Case Study: LSASS Memory Scraping

This project analyzes a simulated host-based credential dumping attempt discovered via an anomalous process execution chain. Using Steven Tuschman’s Cybersecurity Battlefield framework and a six-layer Windows OS triage model, the investigation traces attacker behavior across system layers—culminating in the discovery of credential access from memory via LSASS.


🚨 Executive Summary

  • Trigger: EDR alert flagged abnormal execution: explorer.exe → cmd.exe → powershell.exe with base64-encoded script.
  • Triage Method: Full host-based forensic triage using logs, EDR, registry inspection, memory capture, and network review.
  • Outcome: Credential harvesting via PowerDump targeting lsass.exe confirmed in memory; local persistence and outbound beaconing also observed.

🧩 Battlefield Mapping

Battlefield Layer Attack Surface Exploited
Layer 1: Process Execution Obfuscated PowerShell launched from GUI shell → cmd
Layer 2: Startup & Persistence Registry Run key & dropped binary (svcupdate.exe)
Layer 3: Background Services Validated service registry entries for tampering
Layer 4: Credential Management Credential scraping via LSASS memory access (PROCESS_VM_READ)
Layer 5: Monitoring & Detection CrowdStrike Falcon EDR flagged abnormal parent-child chain
Layer 6: Network Communication HTTPS beaconing to auth-verifier[.]net over TLS

🔬 Key Investigation Steps

1. Windows Event Log Review

  • Event ID 4688: Traced suspicious execution chain with -enc flag
  • Event ID 4624: Odd-hour interactive logon
  • Event ID 13: Registry key created pointing to dropped binary

2. EDR Telemetry Review (CrowdStrike)

  • Parent-child execution tree validated
  • PowerShell memory handle to lsass.exe confirmed (PROCESS_VM_READ)
  • Obfuscated script decoded to known PowerDump credential tool

3. Registry & File Inspection

  • Malicious file in C:\Users\Public\ (unsigned, unknown hash)
  • Persistence via HKCU\Software\Microsoft\Windows\CurrentVersion\Run

4. Volatile Memory Capture

  • Tool: Magnet RAM Capture → Volatility Framework
  • Retrieved PowerDump.ps1 script from memory
  • LSASS access confirmed, no rootkit behavior found

5. Network Artifact Review

  • SWG & firewall logs showed outbound beaconing to:
    • auth-verifier[.]net (new domain, self-signed TLS cert)
    • IP: 94.130.10.42 on 90-second interval

🔐 Root Cause & Threat Model

  • Attacker operated entirely within GUI session — no phishing or exploit.
  • Local admin rights + unrestricted PowerShell enabled credential access.
  • Outbound firewall allowed TLS to untrusted domains.
  • PowerShell logging was disabled — reducing script visibility.

✅ Containment Actions

  • Host isolated via EDR
  • svcupdate.exe quarantined
  • Registry keys deleted
  • Memory dump preserved
  • Credentials rotated & sessions invalidated
  • IP/domain block applied in firewall

🧭 Lessons Learned

  • Remove local admin rights from standard users
  • Enable PowerShell script block logging
  • Block outbound TLS to unvetted domains
  • Enforce application allowlisting
  • Require MFA for local workstation logon

💡 Skills Demonstrated

  • Host-based forensic triage
  • EDR investigation and process chain analysis
  • Memory forensics (Volatility + Magnet RAM Capture)
  • Adversary behavior modeling using battlefield framework
  • Structured investigation documentation

📁 Repository Contents

File Description
ioc-lsass-memory-dump.ipynb Full triage workflow in Jupyter
memory_sample.vmem Captured RAM image (for Volatility)
decoded_script.ps1 Recovered PowerDump credential script
eventlog_notes.txt Key event IDs and triage timeline

🔗 Related Projects


© 2025 Steven Tuschman – GitHub: Compcode1

About

The case illustrates the power of structured host-based triage — beginning with logs and EDR, and moving through file inspection, RAM capture, and finally, network artifact confirmation.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors