SigmaHQ/rules/windows/process_access/sysmon_lsass_dump_comsvcs_dll.yml
2021-05-21 12:23:09 +02:00

25 lines
860 B
YAML
Executable File

title: Lsass Memory Dump via Comsvcs DLL
id: a49fa4d5-11db-418c-8473-1e014a8dd462
description: Detects adversaries leveraging the MiniDump export function from comsvcs.dll via rundll32 to perform a memory dump from lsass.
status: experimental
date: 2020/10/20
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
tags:
- attack.credential_access
- attack.t1003.001
references:
- https://twitter.com/shantanukhande/status/1229348874298388484
- https://modexp.wordpress.com/2019/08/30/minidumpwritedump-via-com-services-dll/
logsource:
category: process_access
product: windows
detection:
selection:
TargetImage: 'C:\windows\system32\lsass.exe'
SourceImage: 'C:\Windows\System32\rundll32.exe'
CallTrace|contains: 'comsvcs.dll'
condition: selection
falsepositives:
- Unknown
level: critical