{"id":15393,"date":"2019-05-24T19:00:48","date_gmt":"2019-05-25T03:00:48","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/05\/24\/news-9142\/"},"modified":"2019-05-24T19:00:48","modified_gmt":"2019-05-25T03:00:48","slug":"news-9142","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/05\/24\/news-9142\/","title":{"rendered":"Detecting credential theft through memory access modelling with Microsoft Defender ATP"},"content":{"rendered":"<p><strong>Credit to Author: Eric Avena| Date: Thu, 09 May 2019 17:29:45 +0000<\/strong><\/p>\n<p>Stealing user credentials is a key step for attackers to move laterally across victim networks. In today\u2019s attacks, we see a range of tools used to achieve credential theft, requiring protections that target the root behavior and not just individual known tools as is often done by traditional antimalware software.<\/p>\n<p>Microsoft Defender Advanced Threat Protection (<a href=\"https:\/\/www.microsoft.com\/en-us\/WindowsForBusiness\/windows-atp?ocid=cx-blog-mmpc\">Microsoft Defender ATP<\/a>), Microsoft\u2019s unified endpoint protection platform, uses multiple approaches to detect <a href=\"https:\/\/attack.mitre.org\/techniques\/T1003\/\">credential dumping<\/a>. In this post, we\u2019ll discuss one of them: a statistical approach that models memory access to the Local Security Authority Subsystem Service (<em>lsass.exe<\/em>) process.<\/p>\n<p>The <em>lsass.exe<\/em> process manages many user credential secrets; a key behavior associated with credential theft, and therefore common across many tools used by attackers, is to read large amounts of data from this process\u2019 memory space.<\/p>\n<p>Microsoft Defender ATP instruments memory-related function calls such as <em>VirtualAlloc<\/em> and <em>VirtualProtect<\/em> to catch in-memory attack techniques like <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2017\/11\/13\/detecting-reflective-dll-loading-with-windows-defender-atp\/\">reflective DLL loading<\/a>. The same signals can also be used to generically detect malicious <a href=\"https:\/\/attack.mitre.org\/techniques\/T1003\/\">credential dumping<\/a> activities performed by a wide range of different individual tools.<\/p>\n<h3>A statistical approach to detecting credential theft<\/h3>\n<p>Reviewing the behavior of multiple known tools, we see that the number and size of memory reads from the <em>lsass.exe<\/em> process related to credential dumping are highly predictable. The diagram below shows a (slightly simplified) view of this.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89393 aligncenter\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/05\/Fig1-.png\" alt=\"Fig1-number-of-read-perations-vs-number-of-bytes-read\" width=\"547\" height=\"510\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/05\/Fig1-.png 547w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/05\/Fig1--300x280.png 300w\" sizes=\"auto, (max-width: 547px) 100vw, 547px\" \/><\/p>\n<p>By contrast, legitimate reads from the <em>lsass.exe<\/em> process, such as routine handling of users signing in, fall outside this cluster.<\/p>\n<p>Microsoft Defender ATP uses such a model to discriminate between expected and unexpected accesses to <em>lsass.exe<\/em> process memory, and raise an alert in the latter case:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89395 aligncenter\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/05\/Fig2-Sensitive-credential-memory-read.png\" alt=\"Fig2-Sensitive-credential-memory-read\" width=\"896\" height=\"456\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/05\/Fig2-Sensitive-credential-memory-read.png 896w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/05\/Fig2-Sensitive-credential-memory-read-300x153.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/05\/Fig2-Sensitive-credential-memory-read-768x391.png 768w\" sizes=\"auto, (max-width: 896px) 100vw, 896px\" \/><\/p>\n<p>Microsoft Defender ATP\u2019s process tree view of the alert identifies the tool performing the suspicious credential access activity, in this example, <em>sqldumper.exe<\/em>. This is a legitimate administrator tool found on many database servers, but attackers have been known to abuse it to dump credentials to avoid the risk of downloading custom tooling that may be flagged by antimalware solutions.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89396 aligncenter\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/05\/Fig3-Alert-process-tree.png\" alt=\"Fig3-Alert-process-tree\" width=\"589\" height=\"348\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/05\/Fig3-Alert-process-tree.png 589w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/05\/Fig3-Alert-process-tree-300x177.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/05\/Fig3-Alert-process-tree-440x260.png 440w\" sizes=\"auto, (max-width: 589px) 100vw, 589px\" \/><\/p>\n<p>Similarly, Microsoft Defender ATP detects attacker abuse of otherwise legitimate administrator tooling, such as the Microsoft Sysinternals tool <a href=\"https:\/\/docs.microsoft.com\/en-us\/sysinternals\/downloads\/procdump\">ProcDump<\/a> or Task Manager, when these are repurposed to dump <em>lsass.exe<\/em> process memory. Attackers take this approach, sometimes referred to as <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2018\/09\/27\/out-of-sight-but-not-invisible-defeating-fileless-malware-with-behavior-monitoring-amsi-and-next-gen-av\/\">living-off-the-land<\/a>, to avoid tools that they know are commonly detected as malicious. In the memory-dumping scenario described here, they may even exfiltrate the memory dump and perform the credential extraction offline rather than on the victim machine.<\/p>\n<p>Over time we have also seen Microsoft Defender ATP identify several distinct custom tools using this memory modelling technique. A couple of open-source examples are shown here.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-89397\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/05\/Fig4-Sample-open-source-tools.png\" alt=\"Fig4-Sample-open-source-tools\" width=\"589\" height=\"257\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/05\/Fig4-Sample-open-source-tools.png 844w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/05\/Fig4-Sample-open-source-tools-300x131.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/05\/Fig4-Sample-open-source-tools-768x335.png 768w\" sizes=\"auto, (max-width: 589px) 100vw, 589px\" \/><\/p>\n<h3>Foiling cyberattacks by stopping credential theft<\/h3>\n<p>In this blog post we illustrated one of several ways in which Microsoft Defender ATP detects credential theft. Security operations (SecOps) teams can use the alerts in <a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp?ocid=cx-blog-mmpc\">Microsoft Defender ATP<\/a> to quickly identify and respond to attacks: stopping credential dumping techniques empowers SecOps to resolve cyberattacks before the latter stages, such as lateral movement, command-and-control, and exfiltration.<\/p>\n<p>Microsoft Defender ATP uses rich security data, advanced behavioral analytics, and machine learning to detect attacks. Enhanced instrumentation and detection capabilities in Microsoft Defender ATP can better expose covert, sophisticated attacker techniques like credential theft and other in-memory attacks. Microsoft Defender ATP demonstrated its strength in detecting credential dumping and other high-impact attacker techniques in <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-Defender-ATP\/MITRE-evaluation-highlights-industry-leading-EDR-capabilities-in\/ba-p\/369831\">MITRE\u2019s evaluation of EDR solutions<\/a>.<\/p>\n<p>Microsoft Defender ATP contributes to and benefits from security signals shared across Microsoft\u2019s security solutions through <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Security-Privacy-and-Compliance\/Announcing-Microsoft-Threat-Protection\/ba-p\/262783\">Microsoft Threat Protection<\/a>, which provides seamless, integrated, and comprehensive security across multiple attack vectors. The enriched security data drives stronger protection and the orchestration of threat remediation across identities, endpoints, email and data, apps, and infrastructure.<\/p>\n<p>To test how Windows Defender ATP can help your organization detect, investigate, and respond to advanced attacks, <a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp?ocid=cx-blog-mmpc\"><strong>sign up for a free trial<\/strong><\/a>.<\/p>\n<p>To learn more about Microsoft Threat Protection, read our monthly updates on the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/the-evolution-of-microsoft-threat-protection\/\">evolution of this comprehensive security solution<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>Rob Mead<\/strong> and <strong>Tim Burrell<\/strong><\/em><br \/> <em>Microsoft Threat Intelligence Center<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<h3>Talk to us<\/h3>\n<p>Questions, concerns, or insights on this story? Join discussions at the\u00a0<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-Defender-Advanced-Threat\/ct-p\/WindowsDefenderAdvanced\">Microsoft Defender ATP community<\/a>.<\/p>\n<p>Follow us on Twitter <a href=\"https:\/\/twitter.com\/MsftSecIntel\" target=\"_blank\" rel=\"noopener\"><strong>@MsftSecIntel<\/strong><\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/05\/09\/detecting-credential-theft-through-memory-access-modelling-with-microsoft-defender-atp\/\">Detecting credential theft through memory access modelling with Microsoft Defender ATP<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/05\/09\/detecting-credential-theft-through-memory-access-modelling-with-microsoft-defender-atp\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Eric Avena| Date: Thu, 09 May 2019 17:29:45 +0000<\/strong><\/p>\n<p>Microsoft Defender ATP instruments memory-related function calls such as VirtualAlloc and VirtualProtect to catch in-memory attack techniques like reflective DLL loading. The same signals can also be used to generically detect malicious credential dumping activities performed by a wide range of different individual tools.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/05\/09\/detecting-credential-theft-through-memory-access-modelling-with-microsoft-defender-atp\/\">Detecting credential theft through memory access modelling with Microsoft Defender ATP<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[21862,21863,4500,21482,12843,11577,21864,21865,21866,21867,21868,21484,17260,12191,21496],"class_list":["post-15393","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-credential-dumping","tag-credential-theft","tag-cybersecurity","tag-endpoint-security","tag-fileless","tag-in-memory-attacks","tag-lateral-movement","tag-living-off-the-land","tag-lsass","tag-lsass-exe","tag-memory-access-modelling","tag-microsoft-defender-atp","tag-reflective-dll-loading","tag-targeted-attacks","tag-windows-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15393"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15393\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15393"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}