
Summary
The 'PowerShell MiniDump Script' detection rule identifies potentially malicious PowerShell scripts that utilize the `MiniDumpWriteDump` function from the `Dbghelp.dll` library to create memory dumps of processes, particularly targeting LSASS (Local Security Authority Subsystem Service). This capability can be exploited by attackers to retrieve sensitive information such as credentials stored in memory. The rule employs a query that looks for the execution of PowerShell scripts containing specific keywords related to memory dumping within a defined time frame, excluding system processes. In addition to detection, the rule outlines analysis steps for investigating triggered alerts, examining script content for suspicious characteristics, and assessing potentially related alerts from the user or host. Given the nature of memory dumping, false positives are considered rare, as typical users lack justification for utilizing such tools unless for legitimate troubleshooting purposes. The response recommendations emphasize isolating affected hosts, restricting PowerShell usage in non-IT contexts, and conducting comprehensive investigations into potential credential exposure and malware persistence.
Categories
- Endpoint
- Windows
Data Sources
- Script
- Application Log
ATT&CK Techniques
- T1003
- T1003.001
- T1059
- T1059.001
Created: 2021-10-05