heroui logo

HackTool - Quarks PwDump Execution

Sigma Rules

View Source
Summary
The detection rule identifies the execution of the Quarks PwDump tool, which is known for extracting password hashes from the memory of Windows systems. This tool can potentially be used by attackers to gain unauthorized access to user credentials, leading to credential theft and further exploitation of the affected system. The rule focuses on monitoring command line arguments that are typically associated with the execution of the tool. By looking for specific keywords within the command line used at the time of process creation, the rule effectively flags instances when Quarks PwDump is invoked. A combination of the criteria set ensures that processes triggering any of these command line arguments are captured, which indicates the potential malicious activity being executed. This rule is critical for enhancing detection abilities within environments at risk for credential-related attacks, particularly for organizations that rely heavily on Windows operating systems.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-09-05