Procdump Execution
Detects usage of the SysInternals Procdump utility
Sigma rule (View on GitHub)
1title: Procdump Execution
2id: 2e65275c-8288-4ab4-aeb7-6274f58b6b20
3status: test
4description: Detects usage of the SysInternals Procdump utility
5references:
6 - https://learn.microsoft.com/en-us/sysinternals/downloads/procdump
7author: Florian Roth (Nextron Systems)
8date: 2021-08-16
9modified: 2023-02-28
10tags:
11 - attack.defense-evasion
12 - attack.t1036
13 - attack.t1003.001
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection:
19 Image|endswith:
20 - '\procdump.exe'
21 - '\procdump64.exe'
22 condition: selection
23falsepositives:
24 - Legitimate use of procdump by a developer or administrator
25level: medium
References
Related rules
- CreateDump Process Dump
- DumpMinitool Execution
- HackTool - XORDump Execution
- Potential LSASS Process Dump Via Procdump
- Potential SysInternals ProcDump Evasion