title: Process Dump via Comsvcs DLL id: 09e6d5c0-05b8-4ff8-9eeb-043046ec774c status: experimental description: Detects process memory dump via comsvcs.dll and rundll32 references: - https://modexp.wordpress.com/2019/08/30/minidumpwritedump-via-com-services-dll/ - https://twitter.com/SBousseaden/status/1167417096374050817 author: Modexp (idea) date: 2019/09/02 logsource: category: process_creation product: windows detection: rundll_image: Image: '*\rundll32.exe' rundll_ofn: OriginalFileName: 'RUNDLL32.EXE' selection: CommandLine: - '*comsvcs*MiniDump*full*' - '*comsvcs*MiniDumpW*full*' condition: (rundll_image or rundll_ofn) and selection fields: - CommandLine - ParentCommandLine tags: - attack.credential_access - attack.t1003 - attack.t1003.001 falsepositives: - unknown level: medium