Suspicious Unsigned Dbghelp/Dbgcore DLL Loaded

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects the load of dbghelp/dbgcore DLL (used to make memory dumps) by suspicious processes. Tools like ProcessHacker and some attacker tradecract use MiniDumpWriteDump API found in dbghelp.dll or dbgcore.dll. As an example, SilentTrynity C2 Framework has a module that leverages this API to dump the contents of Lsass.exe and transfer it over the network back to the attacker's machine.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "sa_imageloaded" AND OBJECTNAME endswith "\dbghelp.dll,\dbgcore.dll" AND SIGNED = "false" select Action1.HOSTNAME,Action1.MESSAGE,Action1.PROCESSNAME,Action1.PRODUCT_NAME,Action1.OBJECTNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Perez Diego (@darkquassar), oscd.community, Ecco