Dump file threat containment

Entities: Process name Log type: Windows Server

Playbook Description

This playbook helps contain file dumping by analyzing process trees for malicious flow and command lines for credential dumping tools. It remediates the attack and relocates dump files, terminates and quarantines processes, removes persistence, enables LSASS protection, and blocks the abuse tools.

MITRE ATT&CK mapping

Tactics Techniques Sub-techniques
Credential Access(TA0006) OS Credential Dumping(T1003) Security Account Manager(T1003.002)
Credential Access(TA0006) OS Credential Dumping(T1003) LSA Secrets(T1003.004)

MITRE D3FEND mapping

Tactics Techniques Sub-techniques
Detect(D3-Detect) Identifier Analysis(D3-ID) File Hash Reputation Analysis(D3-FHRA)

Playbook input type

Alert

Prerequisites

  • PowerShell Version 5.1+ must be available on the target host.
  • Windows Defender must be enabled and active on the target host.
  • Software Restriction Policy (SRP) must not be disabled on the target host.
  • Windows Credentials - Go to Settings -> Devices -> Windows Devices. Provide/update the credentials of the respective Windows device with admin privileges.

Dependencies

Utility functions:

  • utility_convertTimeToUTC
  • utility_getRequiredTime
  • windows_detectMaliciousProcessChain
  • windows_commandLineAnalysisProcdumpComsvcs
  • utility_convertToString
  • utility_sendMail

Scripts

Script Name Description Arguments
EnableASRToPreventLSASS.ps1 Enables the Attack Surface Reduction (ASR) rule to block credential stealing from the LSASS process (Rule ID: 9e6ea9f3-2e94-4a2a-89e3-4c77b740ab4a )
FetchPersistenceEntries.ps1 Scans for persistence mechanisms including scheduled tasks, registry Run/RunOnce keys, startup folder entries, and services to identify potential malicious persistence -
QuarantineFiles.ps1 Moves one or more files to a quarantine directory ( %USERPROFILE%\Forensic_Quarantine ), strips inherited permissions via .NET ACL API, and grants read-only access to Administrators. Skips protected PowerShell executables. FilePaths
AddSoftwareRestrictionPolicy.ps1 Creates Software Restriction Policy (SRP) rules in the Windows registry to block execution of programs from specified paths. For each path, it checks if an SRP rule already exists — if so and it's not set to "Disallowed", it updates the existing rule; otherwise it creates a new GUID-keyed rule under HKLM:\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths. Enables SRP enforcement (TransparentEnabled=1, PolicyScope=0) on each run. RestrictedPath
TerminateSession.ps1 Logs off one or more user sessions using logoff , with optional RDP-only filtering by remote IP UserNames
StopAndQuarantineProcess.ps1 # Terminates processes by PID (decimal/hex) or by executable file path, then quarantines the executable to a forensic directory. # Protects critical OS processes and the SOAR agent from termination. ProcessIdentifiers

Execution workflow

Investigation:

  • Retrieves the process tree.
  • Checks for malicious process.

Decision logic:

  • Proceeds to remediation based on the following conditions:
    • A malicious execution flow was detected in the process tree.
  • If suspicious but not confirmed malicious, sends a notification for manual review and stops further actions.
  • If no malicious indicators are confirmed, the playbook ends with no further actions.

Remediation:

  • Analyzes the command line for suspicious patterns, URLs, or file paths.
  • Relocates the dump file.
  • Notifies the dump analysis.
  • Terminates and quarantines processes.
  • Enables LSASS protection.
  • Blocks procdump and comsvcs.
  • Logs off the user.
  • Removes persistence.
  • Validates if all remediation actions are completed successfully.
  • Builds the notification email with remediation details and findings.
  • Sends a notification email regarding the actions taken and required next steps.
Execution Workflow
Figure: Execution workflow of the playbook

Post execution procedure

  • Analyze the relocated dump file for evidence of credential theft.
  • Reset credentials for accounts that might have been compromised.
  • Review system logs for lateral movement or privilege escalation indicators.
  • Confirm that LSASS protection and software restriction policies are active.
  • Notify the affected user about the actions taken.