
Summary
This detection rule focuses on identifying the execution of the XORDump utility, which is a process memory dumping tool often used for malicious purposes. It detects when XORDump is invoked to target sensitive processes including 'lsass.exe', indicating potential credential dumping attempts. The rule triggers on specific command line parameters that accompany the XORDump execution, which are characteristic of its malicious use. Implemented within a Windows environment, this rule effectively enhances security monitoring by providing alerts when this tool is executed in a suspicious context.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2022-01-28