Download presentation
Presentation is loading. Please wait.
1
“Pass the Hash” Detection with DDNA
Phil Wallisch
2
The Need It is possible for “admin” users to dump LSA hashes on modern Windows platforms An attacker can impersonate any user by leveraging a captured hash No persistent malware is required to perform the attack. We must detect exited tools. Detect hash dumping/injecting capability in running processes
3
The Approach Locate attack remnants in unallocated memory
Identify active processes that exhibit hash grabbing characteristics
4
Attack Tools Examined Pass-The-Hash (PTH) Toolkit Gsecdump Pwdump6
Gsecdump Pwdump6
5
Attack Procedure Platform: Windows XP SP2 32bit running in VMWare Workstation 6.5. Two users added to the “administrator” group: ‘attacker’ and ‘victim’ Victim logs in via a standard interactive session The “switch user” functionality is executed Attacker logs in via a standard interactive session Attacker executes the hash dump functionality of the tool
6
PTH Toolkit Example
7
Gsecdump Example
8
Pwdump6 Example
9
Locate Attack Remnants
External Research: indicates that password hashes should not be present in virtual memory in their unencrypted form Internal Testing: performed a pattern matching string search across 54 memory images from a live corporate environment 60 malware infected memory images from a lab environment 3 separate memory images where hash dumping tools were individually run
10
Locate Attack Remnants (cont.)
Pattern Used: "\b[a-fA-F0-9]{32}:[a-fA-F0-9]{32}\b“ Word bounded search for two 32 hexadecimal character patterns separated by a colon Results: Live corporate images = 0 matches Malware infected images = 0 matches Hash dump memory images = 60 matches
11
Locate Attack Remnants (cont.)
Conclusion: DDNA should have a hard fact for the presence of a string pattern "\b[a-fA-F0-9]{32}:[a-fA-F0-9]{32}\b” in any location in memory including unallocated space. This hard fact indicates evidence of an unencrypted LSA hash in memory on a system of interest. This technique is a tool agnostic approach to discovering LSA tampering.
12
Active Processes Detection Goals:
Modules with LSA hash dumping capabilities Modules with LSA hash injecting capabilities Solution: DDNA traits covering PTH techniques Naming convention of DDNA traits: PTH_X where “X” = trait number
13
LSASS Injection - PTH_1 iam-alt.exe DDNA PTH_1 Research:
Regex Pattern: (virtualalloc|createremotethread|lsass.exe) Translate to AND logic in DDNA
14
LSASS Injection - PTH_1 (cont.)
gsecdump.exe pwdump6.exe
15
LSASRV.DLL Loading - PTH_2
16
Active Processes Conclusion
DDNA Traits Required: PTH_1: Hash Injection : Identify LSASS DLL injection : I“VirtualAlloc"ku AND I“CreateRemoteThread”ku AND I”lsass.exe”ku PTH_2: Hash Dumping : Identify LSASRV.DLL access : I”lsasrv.dll”ku NOT N”svchost.exe” NOT N”lsass.exe”
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.