Suspicious Dump64.exe Execution
Detects when a user bypasses Defender by renaming a tool to dump64.exe and placing it in a Visual Studio folder
Sigma rule (View on GitHub)
1title: Suspicious Dump64.exe Execution
2id: 129966c9-de17-4334-a123-8b58172e664d
3status: test
4description: Detects when a user bypasses Defender by renaming a tool to dump64.exe and placing it in a Visual Studio folder
5references:
6 - https://twitter.com/mrd0x/status/1460597833917251595
7author: Austin Songer @austinsonger, Florian Roth
8date: 2021/11/26
9modified: 2023/03/24
10tags:
11 - attack.credential_access
12 - attack.t1003.001
13logsource:
14 product: windows
15 category: process_creation
16detection:
17 selection:
18 Image|endswith: '\dump64.exe'
19 procdump_flags:
20 CommandLine|contains:
21 - ' -ma '
22 - 'accepteula'
23 filter:
24 Image|contains: '\Installer\Feedback\dump64.exe'
25 condition: ( selection and not filter ) or ( selection and procdump_flags )
26falsepositives:
27 - Dump64.exe in other folders than the excluded one
28level: high