Cred Dump Tools Dropped Files
Files with well-known filenames (parts of credential dump software or files produced by them) creation
Sigma rule (View on GitHub)
1title: Cred Dump Tools Dropped Files
2id: 8fbf3271-1ef6-4e94-8210-03c2317947f6
3status: test
4description: Files with well-known filenames (parts of credential dump software or files produced by them) creation
5references:
6 - https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
7author: Teymur Kheirkhabarov, oscd.community
8date: 2019-11-01
9modified: 2022-09-21
10tags:
11 - attack.credential-access
12 - attack.t1003.001
13 - attack.t1003.002
14 - attack.t1003.003
15 - attack.t1003.004
16 - attack.t1003.005
17logsource:
18 category: file_event
19 product: windows
20detection:
21 selection:
22 - TargetFilename|contains:
23 - '\fgdump-log'
24 - '\kirbi'
25 - '\pwdump'
26 - '\pwhashes'
27 - '\wce_ccache'
28 - '\wce_krbtkts'
29 - TargetFilename|endswith:
30 - '\cachedump.exe'
31 - '\cachedump64.exe'
32 - '\DumpExt.dll'
33 - '\DumpSvc.exe'
34 - '\Dumpy.exe'
35 - '\fgexec.exe'
36 - '\lsremora.dll'
37 - '\lsremora64.dll'
38 - '\NTDS.out'
39 - '\procdump64.exe'
40 - '\pstgdump.exe'
41 - '\pwdump.exe'
42 - '\SAM.out'
43 - '\SECURITY.out'
44 - '\servpw.exe'
45 - '\servpw64.exe'
46 - '\SYSTEM.out'
47 - '\test.pwd'
48 - '\wceaux.dll'
49 condition: selection
50falsepositives:
51 - Legitimate Administrator using tool for password recovery
52level: high
References
Related rules
- Credential Dumping Tools Service Execution - Security
- Credential Dumping Tools Service Execution - System
- HackTool - Credential Dumping Tools Named Pipe Created
- HackTool - Mimikatz Execution
- Dumping of Sensitive Hives Via Reg.EXE