Potential LSASS Process Dump Via Procdump

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects suspicious uses of the SysInternals Procdump utility by using a special command line parameter in combination with the lsass.exe process. This way we are also able to catch cases in which the attacker has renamed the procdump executable.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND COMMANDLINE contains " -ma , /ma , –ma , —ma , ―ma " AND COMMANDLINE contains " ls" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Florian Roth (Nextron Systems)