Home >
Enterprise >
Participants >
Palo Alto Networks >
OS Credential Dumping: LSASS Memory (T1003.001)
|
|
See subtechnique results for:
Carbanak+FIN7 |
||||||||||
Step | ATT&CK Pattern |
|
||||||||
4.B.7
|
|
|||||||||
15.A.6
|
|
APT29 |
||||||||||||||
Step | ATT&CK Pattern |
|
||||||||||||
14.B.4
|
|
|||||||||||||
16.D.2
|
|
Procedure
Dumped the KRBTGT hash on the domain controller host NewYork (10.0.0.4) using Mimikatz (m.exe)
Criteria
m.exe injecting into lsass.exe to dump credentials
Footnotes
- According to the vendor, payload execution would have been prevented as Wildfire labeled the payload as malicious/malware.


[2]


[3]


Procedure
Dumped the KRBTGT hash on the domain controller host NewYork (10.0.0.4) using Mimikatz (m.exe)
Criteria
m.exe injecting into lsass.exe to dump credentials
Footnotes
- According to the vendor, payload execution would have been prevented as Wildfire labeled the payload as malicious/malware.


APT3 |
||||
Step | ATT&CK Pattern |
|
||
5.A.1.1
|
|