
Summary
This detection rule is designed to identify the creation of memory dump files associated with the LSASS (Local Security Authority Subsystem Service) process, which is a target for attackers seeking to extract user credentials. The rule monitors for file creation events that match specific patterns typical of memory dumping tools, such as Procdump and Nanodump, that can potentially generate dumps of LSASS memory. The selected filenames include known extensions like .dmp, .zip, and .rar, which are often used by these tools. By capturing these events, security teams can be alerted to possible credential harvesting attempts, providing an opportunity to respond before sensitive information is compromised.
Categories
- Endpoint
- Windows
Data Sources
- File
Created: 2021-11-15