heroui logo

Potential Windows Defender AV Bypass Via Dump64.EXE Rename

Sigma Rules

View Source
Summary
This rule detects potential attempts to bypass Windows Defender Antivirus (AV) by monitoring processes that involve renaming a tool to `dump64.exe` within the `Microsoft Visual Studio` directory. The rule is currently optimized to identify the usage of `procdump`, a commonly used utility for capturing process memory dumps, but it also allows for the addition of other similar tools to enhance overall detection coverage. The detection mechanisms are built around monitoring the process creation activity in Windows environments, focusing on specific characteristics of the executable name and its path in a known development environment. By capturing such instances, the rule aims to preemptively address potential misuse of legitimate tools for malicious activities, particularly related to credential access and memory dumping techniques. As a result, this heightened awareness can help organizations better safeguard their systems against unauthorized access and potential data exfiltration efforts.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2021-11-26