title: Renamed ProcDump id: 4a0b2c7e-7cb2-495d-8b63-5f268e7bfd67 status: experimental description: Detects the execution of a renamed ProcDump executable often used by attackers or malware references: - https://docs.microsoft.com/en-us/sysinternals/downloads/procdump author: Florian Roth date: 2019/11/18 tags: - attack.defense_evasion - attack.t1036 logsource: product: windows category: process_creation detection: selection: OriginalFileName: 'procdump' filter: Image: - '*\procdump.exe' - '*\procdump64.exe' condition: selection and not filter falsepositives: - Procdump illegaly bundled with legitimate software - Weird admins who renamed binaries level: critical