
Summary
This rule is designed to detect the creation of files that are associated with credential dumping activities on Windows systems. Credential dumping is a technique employed by attackers to obtain sensitive credential information such as passwords and authentication tokens from memory, storage, or various information repositories. The rule checks for the presence of well-known filenames that are typical outputs or components of credential dump tools. Specifically, it looks for files with specific names that either contain or end with particular strings indicative of such tools, thus enabling the identification of potential malicious activity targeting credentials.
Categories
- Windows
- Endpoint
Data Sources
- File
Created: 2019-11-01