Kernel Memory Dump Via LiveKD

Detects execution of LiveKD with the "-m" flag to potentially dump the kernel memory

Sigma rule (View on GitHub)

 1title: Kernel Memory Dump Via LiveKD
 2id: c7746f1c-47d3-43d6-8c45-cd1e54b6b0a2
 3status: experimental
 4description: Detects execution of LiveKD with the "-m" flag to potentially dump the kernel memory
 5references:
 6    - https://learn.microsoft.com/en-us/sysinternals/downloads/livekd
 7    - https://4sysops.com/archives/creating-a-complete-memory-dump-without-a-blue-screen/
 8    - https://kb.acronis.com/content/60892
 9author: Nasreddine Bencherchali (Nextron Systems)
10date: 2023/05/16
11tags:
12    - attack.defense_evasion
13logsource:
14    category: process_creation
15    product: windows
16detection:
17    selection_img:
18        - Image|endswith:
19              - '\livekd.exe'
20              - '\livekd64.exe'
21        - OriginalFileName: 'livekd.exe'
22    selection_cli:
23        CommandLine|contains|all:
24            - ' /m'
25            - ' -m'
26    condition: all of selection_*
27falsepositives:
28    - Unlikely in production environment
29level: high

References

Related rules

to-top