Skip to content

Latest commit

 

History

History
33 lines (26 loc) · 1.07 KB

MATCH-S00427.md

File metadata and controls

33 lines (26 loc) · 1.07 KB

Rules: Process Dump via Rundll32 and Comsvcs.dll

Description

Detects a process memory dump performed via ordinal function 24 in comsvcs.dll.

Additional Details

Detail Value
Type Templated Match
Category Credential Access
Apply Risk to Entities device_hostname, device_ip, user_username
Signal Name Process Dump via Rundll32 and Comsvcs.dll
Summary Expression A process dump has been observed using RUNDLL32 and COMSVCS on host: {{device_hostname}}
Score/Severity Static: 4
Enabled by Default True
Prototype False
Tags _mitreAttackTactic:TA0006, _mitreAttackTechnique:T1003, _mitreAttackTechnique:T1003.001

Vendors and Products

Fields Used

Origin Field
Normalized Schema commandLine
Normalized Schema device_hostname
Normalized Schema device_ip
Normalized Schema user_username