Dumping LSASS with bypassing ASR defense mechanism

Intro

Recently, I had a conversation about the Local Security Authority Subsystem Service (LSASS) process and its protection mechanisms. This inspired me to dig deeper into the topic and write this post, focusing on LSASS credential dumping and the various Windows protection mechanisms against it.

I will not write a full description of LSASS here, as many articles already cover that. Instead, I’ll focus on the basics and dive straight into the technical details.

In a Windows system, users authenticate to their machines —whether locally or remotely—using a username and password. Behind the scenes, the responsibility for handling all authentication tasks lies with the LSASS. This process, represented by the “lsass.exe”, retains sensitive authentication details in its memory, such as user credentials and password hashes.

With this in mind, we as attackers could focus on extracting data from the LSASS process despite it’s not OPSEC action, but sometimes we are forced to obtain sensitive Windows credentials from lsass.exe. Once these credentials are compromised, they can be leveraged to facilitate lateral movement within the network and perform other malicious activities. This technique, known as credential dumping, is a critical step in the attacker’s kill chain for compromising accounts, passwords, and hashes.

Tools

Most common tools & techniques in order to dump credentials from LSASS:

Requirements to get dump from LSASS:

You must have an administration session with It is necessary to have SeDebugPrivilege (Required to debug and adjust the memory of a process owned by another account) privilege (must be enabled) to dump LSASS.
By default, SeDebugPrivilege is granted to members of the Administrators group. However, it is not always enabled automatically in their sessions; it needs to be explicitly enabled.

Defense Mechanisms to Prevent LSASS Dumping

In that blog we go deeper in field to bypass Attack Surface Reduction (ASR) rule and successfully get a dump from LSASS.
But it’s important to highlight popular existsing defense mechanisms to prevent LSASS dumping.

Attack Surface Reduction (ASR) Rules

ASR is a collection of hardening configurations designed to mitigate common attack techniques employed by adversaries. ASR rules are implemented using LUA (Lightweight Utility Applications) and are enforced through Windows Defender.
ASR provides an additional layer of defense against cyber threats.

You can find a list of those rules and their GUID here.

Block Credential Stealing from LSASS

Today we will focus and work with
Block credential stealing from the Windows local security authority subsystem (lsass.exe) rule.
GUID:
9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2

This rule helps prevent credential stealing, by locking down Local Security Authority Subsystem Service (LSASS).
When we try to dump LSASS Microsoft defender will flag it as malicious because the ASR rule prevents untrusted processes from having direct access to LSASS memory.

And here we are, few questions was risen in my head:
Do trusted processes exist?
Which processes is it?
Could we use it to bypass that rule?


Be patient and keep reading. Back to the main flow.

You can enable attack surface reduction rules by using any of these methods:

In my home domain lab environment, I will be implementing Attack Surface Reduction (ASR) through Group Policy.

In the ‘Value Name’ field, we should insert the GUID of the rule we want to enable, in this case, 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2. In the ‘Value’ field, we should set the value to ‘1’ (Block) to enable the Attack Surface Reduction rule.

Enumeration

ASR rules can be enumerated remotely via GPO, from the local registry of a machine to which they’re applied, or with PowerShell’s Get-MpPreference cmdlet.

GPO
One possible approach is to search Group Policy Objects (GPOs) by name.
For example, this can be done using PowerView. However, in my opinion, leveraging PowerShell is not ideal from an OPSEC perspective, as it is one of the most commonly monitored executable files, has a history file, and so on.
Although I will provide the payload for retrieving information about ASR rules via PowerShell,but in real-world engagements, I prefer to obtain this information by querying registry hives.

The entry ExploitGuard_ASR_Rules with a ValueData of 1 indicates that ASR rules are enabled.
The output from the ‘Rules’ registry key with the ValueName 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 indicates the ‘Block credential stealing from the Windows Local Security Authority Subsystem (lsass.exe)’ rule is enabled with a ValueData of 1 (Block).

The possible values are:

0 – Disabled; 1 – Block; 2 – Audit; 6 – Warn.
for more info

Registry
In order to obtain information about ASR rules you can also query the local registry:

Powershell

Validating

As seen in the screenshot, we encounter an error with kuhl_m_sekurlsa_acquireLSA. This error occurs logically because the ASR rule is enabled, and the defense mechanism is functioning as expected.

At this point, we will delve into the Windows Defender flow to further investigate.

Defender’s VDM containers

During this research, I came across several insightful articles about the Defender environment and some undocumented aspects. One of these articles was a remarkable research piece by a researcher named Commial—excellent work indeed.

Based on this research, we can conclude that Windows Defender signatures, rules, and metadata are stored in VDM containers. Many of these files are Lua scripts or Lua bytecodes. By utilizing tools like WDExtract, we can decrypt and extract all the PE images from these containers. Afterward, by analyzing the extracted VDM files, we can identify the whitelisted exclusion paths for ASR rules.

In this case, we are primarily focused on the mpasbase.vdm file, which contains signatures, emulation resources, and other related data. Let’s proceed with decrypting and extracting this information.

First, we need to download the mpasbase.vdm file from our lab’s Windows 10 machine.
The default path is:
C:\ProgramData\Microsoft\Windows Defender\Definition Updates\Backup

Next, we will use the WDExtract tool to extract the data.

With the extracted data in hand, the next step is to locate our GUID (9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2) and retrieve the Lua bytecode for further analysis.

To avoid manual routine tasks, I’ve written a small Python script that takes the extracted VDM container (in our case, mpasbase.vdm), searches for the Lua bytecode based on the GUID, and saves it to a file.

Result:

Before the main decompiling process we must prepare / convert our current Lua into a version which could deal with Lua Decompiler (LuaDec). We can achieve this with the native Python MpLua converter.

Finally, we can decompile it, resulting in a human-readable output!

As we can see in obtained output that we have four functions:

  • GetRuleInfo (description about rule)
  • GetMonitoredLocations (which location is monitored; lsass)
  • GetPathExclusions (exclusions with absolute path; binaries and folders)
  • GetCommandLineExclusions (command line exclusion)

Based on this, we can assume that not only the exclusion bypass with absolute path could be effective here, but also GetCommandLineExclusions gives us thought-starter things.
So, GetPathExclusions gives us a list of excluded paths that are permitted to perform lsass.exe dumps even with the ASR rule enabled. However, based on the test results, it was found that not all excluded paths function as expected.

Testing

I’ve sorted the result for better clarity and testing:

I have discovered that not all exclusions work as expected. Furthermore, I have not tested each exclusion individually. Below, you can find the results of the tests conducted. To bypass the ASR rule, we must execute our credential dumping tool (as you wish) on behalf of the relevant process. In the examples below, I’ve used a Cobalt Strike beacon, which successfully bypasses AV (this is something I’ve worked on).

Additionally, I have developed a custom LSASS dumper using the Process Hollowing technique to achieve the goal of working under a specific binary and obtaining an LSASS dump.

*** Process hollowing is commonly performed by creating a process in a suspended state then unmapping/hollowing its memory, which can then be replaced with malicious code.

I took as a basis a shellcode to dump the LSASS process written by Osanda. I’ve changed this shellcode a little bit, the dump file is saved with the name icons.bmp instead of lsass.dmp as in the original.
Of course putting files on target disk it’s bad OPSEC especially with the lsass.dmp name, lol.
Also I have used the NTSection set. It is a set of APIs provides a great alternative to VirtualAllocEx, WriteProcessMemory and VirtualProtectEx.

I based my approach on a shellcode for dumping the LSASS process, originally written by Osanda. I modified the shellcode, specifically changing the name of the dump file to icons.bmp, replacing the original lsass.dmp.
Naturally, placing files on the target disk, especially with a name like lsass.dmp, is poor OPSEC.
Additionally, I utilized the NTSection set, a collection of APIs that offer an effective alternative to VirtualAllocEx, WriteProcessMemory, and VirtualProtectEx.

nt.cs
using System;
using System.Runtime.InteropServices;

namespace ldump
{
    internal class nt
    {
        [StructLayout(LayoutKind.Sequential)]
        public struct STARTUPINFO
        {
            public int cb;
            public IntPtr lpReserved;
            public IntPtr lpDesktop;
            public IntPtr lpTitle;
            public int dwX;
            public int dwY;
            public int dwXSize;
            public int dwYSize;
            public int dwXCountChars;
            public int dwYCountChars;
            public int dwFillAttribute;
            public int dwFlags;
            public short wShowWindow;
            public short cbReserved2;
            public IntPtr lpReserved2;
            public IntPtr hStdInput;
            public IntPtr hStdOutput;
            public IntPtr hStdError;
        }

        [StructLayout(LayoutKind.Sequential)]
        public struct PROCESS_INFORMATION
        {
            public IntPtr hProcess;
            public IntPtr hThread;
            public int dwProcessId;
            public int dwThreadId;
        }

        [StructLayout(LayoutKind.Sequential)]
        public struct SECURITY_ATTRIBUTES
        {
            public int nLength;
            public IntPtr lpSecurityDescriptor;
            public bool bInheritHandle;
        }


        [DllImport("shell32.dll", CharSet = CharSet.Auto)]
        public static extern bool IsUserAnAdmin();

        [DllImport("kernel32.dll", CharSet = CharSet.Unicode, SetLastError = true)]
        public static extern bool CreateProcessW(
            string lpApplicationName,
            string lpCommandLine,
            ref SECURITY_ATTRIBUTES lpProcessAttributes,
            ref SECURITY_ATTRIBUTES lpThreadAttributes,
            bool bInheritHandles,
            uint dwCreationFlags,
            IntPtr lpEnvironment,
            string lpCurrentDirectory,
            ref STARTUPINFO lpStartupInfo,
            out PROCESS_INFORMATION lpProcessInformation);

        [DllImport("ntdll.dll")]
        public static extern uint NtCreateSection(
            ref IntPtr SectionHandle,
            uint DesiredAccess,
            IntPtr ObjectAttributes,
            ref ulong MaximumSize,
            uint SectionPageProtection,
            uint AllocationAttributes,
            IntPtr FileHandle);

        [DllImport("ntdll.dll")]
        public static extern uint NtMapViewOfSection(
            IntPtr SectionHandle,
            IntPtr ProcessHandle,
            out IntPtr BaseAddress,
            IntPtr ZeroBits,
            IntPtr CommitSize,
            IntPtr SectionOffset,
            out ulong ViewSize,
            uint InheritDisposition,
            uint AllocationType,
            uint Win32Protect);

        [DllImport("ntdll.dll")]
        public static extern uint NtCreateThreadEx(
            out IntPtr threadHandle,
            uint desiredAccess,
            IntPtr objectAttributes,
            IntPtr processHandle,
            IntPtr startAddress,
            IntPtr parameter,
            bool createSuspended,
            int stackZeroBits,
            int sizeOfStack,
            int maximumStackSize,
            IntPtr attributeList);

        [DllImport("ntdll.dll", SetLastError = true)]
        public static extern uint NtTerminateProcess(
            IntPtr hProcess,
            int errorStatus);

    }
}

The results are displayed with green indicating success and red indicating failure.

%programfiles(x86)%\SolarWinds

For those who haven’t faced Cobalt Strike yet, the “spawnto” value controls which binary is used as a temporary process for any post-exploitation workflows.

c:\windows\system32\mrt.exe
c:\windows\system32\netstat.exe
c:\windows\system32\lpksetup.exe
c:\windows\system32\wbem\WmiPrvSE.exe
c:\windows\system32\CompatTelRunner.exe
c:\windows\system32\svchost.exe
c:\windows\system32\WerFaultSecure.exe

%programdata%\Citrix\Citrix Workspace *\TrolleyExpress.exe

Summary

In summary, we have organized our findings, identified new path exclusions, and successfully bypassed the ASR rule to dump LSASS. Additionally, we developed our own dumper using the process hollowing technique.
In this post, I focused on PathExclusions, but of course, there is still further research and work to be done. I’m confident there is much more to uncover.

This post also serves as a personal commitment for the New Year, as I am writing it on the evening of December 30th, 2024. Let this be a starting point for writing more and sharing interesting findings with the cybersecurity community. I hope you found it valuable or discovered something useful.

Mitigation

On the defense side, I recommend the following actions:

  • Log and monitor process creation for any processes from the identified list.
  • Enable LSA protection as soon as possible.
  • Implement Credential Guard in your environment, if feasible.
  • Restrict specific paths to binaries and enforce path-based rules to prevent execution using Windows Defender Application Control (WDAC).

Funnymaker Avatar

Leave a Reply

Your email address will not be published. Required fields are marked *

More Articles & Posts