
Summary
This rule aims to detect the use of the 'createdump.exe' utility, which is often used by attackers to dump the memory of processes to a file. The detection focuses on identifying the execution of this utility as part of potentially malicious activities, especially linked to exploitation techniques such as defense evasion. The rule checks for process creation events where the image name ends with 'createdump.exe' or has specific characteristics in its original file name. Additionally, it scrutinizes command-line arguments that typically accompany legitimate memory dump requests, allowing detection of anomalous usage. Given the nature of process memory dumping, the potential for both benign and malicious intent is acknowledged, leading to a classification of the rule's detections with a high false positive rate—particularly in environments where such utility might be legitimately used. Overall, this detection rule is essential for enhancing visibility over process manipulation tactics commonly seen in advanced persistent threats (APTs) and similar threat actor techniques.
Categories
- Endpoint
- Windows
Data Sources
- Process
- File
Created: 2022-01-04