Kernel Memory Dump Via LiveKD
Detects execution of LiveKD with the "-m" flag to potentially dump the kernel memory
Sigma rule (View on GitHub)
1title: Kernel Memory Dump Via LiveKD
2id: c7746f1c-47d3-43d6-8c45-cd1e54b6b0a2
3status: experimental
4description: Detects execution of LiveKD with the "-m" flag to potentially dump the kernel memory
5references:
6 - https://learn.microsoft.com/en-us/sysinternals/downloads/livekd
7 - https://4sysops.com/archives/creating-a-complete-memory-dump-without-a-blue-screen/
8 - https://kb.acronis.com/content/60892
9author: Nasreddine Bencherchali (Nextron Systems)
10date: 2023-05-16
11modified: 2024-03-13
12tags:
13 - attack.defense-evasion
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection_img:
19 - Image|endswith:
20 - '\livekd.exe'
21 - '\livekd64.exe'
22 - OriginalFileName: 'livekd.exe'
23 selection_cli:
24 CommandLine|contains|windash: ' -m'
25 condition: all of selection_*
26falsepositives:
27 - Unlikely in production environment
28level: high
References
Related rules
- AD Object WriteDAC Access
- ADS Zone.Identifier Deleted By Uncommon Application
- AMSI Bypass Pattern Assembly GetType
- APT PRIVATELOG Image Load Pattern
- APT27 - Emissary Panda Activity