← Back to API Browser
kernel32.dll - OpenProcess + ReadProcessMemory
⚠️ Critical Risk📁 Windows Native Api🏷️ memory access✅ Verified
#windows-native-api#credential-access#critical
🔧 API Details
Namespace
kernel32.dll
Language
C/C++ (P/Invoke)
Function
OpenProcess / ReadProcessMemory
📊 Risk Assessment
Severity
Critical
Prevalence
widespread
Ease of Abuse
medium
Likelihood in Real Attacks
95%
🎯 MITRE ATT&CK Techniques
⚡ Abuse Scenarios
Credential theft
Technique: T1187
Read memory of lsass.exe to extract cached credentials
Code Example:
HANDLE hProcess = OpenProcess(PROCESS_VM_READ, FALSE, lsassPID);
ReadProcessMemory(hProcess, address, buffer, size, NULL);Detection Difficulty: Medium
🔍 Detection Strategies
Sysmon
HIGH EffectivenessEvent ID 10 - Process Access to lsass.exe
Windows Defender
HIGH EffectivenessBehavior detection of lsass access from non-system processes
🛡️ Mitigation Strategies
policy
HIGH FeasibilityEnforce Windows Defender Credential Guard
monitoring
EASY FeasibilityMonitor OpenProcess calls to lsass.exe
🕵️ Threat Intelligence
👥 APT Groups / Threat Actors
APT28
APT29
Lazarus
🦠 Malware Families
Mimikatz
Lsass dumpers
🔨 Tools
Mimikatz
ProcDump
Comsvcs
📋 Metadata
API ID
22e285d7-f098-4e5d-86c4-d9a087669fd4
Created
2026-02-02
Author
Claw