Skip to content

Latest commit

 

History

History
31 lines (24 loc) · 1.02 KB

MATCH-S00431.md

File metadata and controls

31 lines (24 loc) · 1.02 KB

Rules: Suspicious Use of Procdump

Description

Detects suspicious uses of the SysInternals Procdump utility by using a special command line parameter in combination with the lsass.exe process. This way we're also able to catch cases in which the attacker has renamed the procdump executable.

Additional Details

Detail Value
Type Templated Match
Category Credential Access
Apply Risk to Entities device_hostname, device_ip, user_username
Signal Name Suspicious Use of Procdump
Summary Expression Suspicious Procdump usage on host: {{device_hostname}}
Score/Severity Static: 4
Enabled by Default True
Prototype False
Tags _mitreAttackTactic:TA0006, _mitreAttackTechnique:T1003, _mitreAttackTechnique:T1003.001

Vendors and Products

Fields Used

Origin Field
Normalized Schema commandLine
Normalized Schema device_hostname
Normalized Schema device_ip
Normalized Schema user_username