Rules: Process Dump via Rundll32 and Comsvcs.dll
Detects a process memory dump performed via ordinal function 24 in comsvcs.dll.
Detail | Value |
---|---|
Type | Templated Match |
Category | Credential Access |
Apply Risk to Entities | device_hostname, device_ip, user_username |
Signal Name | Process Dump via Rundll32 and Comsvcs.dll |
Summary Expression | A process dump has been observed using RUNDLL32 and COMSVCS on host: {{device_hostname}} |
Score/Severity | Static: 4 |
Enabled by Default | True |
Prototype | False |
Tags | _mitreAttackTactic:TA0006, _mitreAttackTechnique:T1003, _mitreAttackTechnique:T1003.001 |
Origin | Field |
---|---|
Normalized Schema | commandLine |
Normalized Schema | device_hostname |
Normalized Schema | device_ip |
Normalized Schema | user_username |