DMP/HDMP File Creation
Detects the creation of a file with the ".dmp"/".hdmp" extension. Often created by software during a crash. Memory dumps can sometimes contain sensitive information such as credentials. It's best to determine the source of the crash.
Sigma rule (View on GitHub)
1title: DMP/HDMP File Creation
2id: 3a525307-d100-48ae-b3b9-0964699d7f97
3status: experimental
4description: Detects the creation of a file with the ".dmp"/".hdmp" extension. Often created by software during a crash. Memory dumps can sometimes contain sensitive information such as credentials. It's best to determine the source of the crash.
5references:
6 - https://learn.microsoft.com/en-us/windows/win32/wer/collecting-user-mode-dumps
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2023/09/07
9tags:
10 - attack.defense_evasion
11logsource:
12 category: file_event
13 product: windows
14detection:
15 selection:
16 TargetFilename|endswith:
17 - '.dmp'
18 - '.dump'
19 - '.hdmp'
20 condition: selection
21falsepositives:
22 - Likely during crashes of software
23level: low
References
Related rules
- Access To .Reg/.Hive Files By Uncommon Application
- Assembly Loading Via CL_LoadAssembly.ps1
- Disabled RestrictedAdminMode For RDS
- Impossible Travel
- Kernel Memory Dump Via LiveKD