Level 4: Core to Some Implementations of (Sub-)Technique

Description: Observables associated with low-variance behaviors of the (Sub-)Technique, unavoidable without a substantially different implementation

Analytics which are core to some implementations of a technique or sub-technique look at the behaviors an adversary will demonstrate during an attack. These are defined as low variance behaviors, those which cannot be avoided by the implementation. Multiple implementations may point to the same low variance behavior, allowing a defender to create a robust analytic.

Note

These observables may change if the definition of the Technique is modified in a new version of ATT&CK.

Observables

Sub-Technique/Technique

Observables

Low Variance Behavior

Modify Authentication Process (T1556)

AttributeLDAPDisplayName: msDS-KeyCredentialLink

AttritubuteLDAPDisplayName is similar to a registry key, as it could be an arbitrary value or one several built-in “special” values. mdDS-KeyCredentialLink is a special value used by the system for authentication 1

Indicator Removal: File Deletion (T1070.004)

Event ID 524 Provider Name: Microsoft-Windows-Backup

While this is a event robustness category, the utilization of this event is indicative of this technique.

OS Credential Dumping: LSASS Memory (T1003.001)

TargetImage = lsass.exe GrantedAccess: 0x1010 OR 0x1410

There are multiple access masks which can be used. This analytic covers two of those access masks. Anything that has the right bits are wildcards essentially 2

References:

1

https://cyberstoph.org/posts/2022/03/detecting-shadow-credentials/

2

https://www.splunk.com/en_us/blog/security/you-bet-your-lsass-hunting-lsass-access.html