heroui logo

Suspicious DumpMinitool Execution

Sigma Rules

View Source
Summary
This detection rule identifies abnormal behavior associated with the usage of the 'DumpMinitool.exe' binary, which is often associated with process dumping techniques that can be exploited by attackers for defense evasion. The rule examines process creation events for instances where the image path ends with specific variations of DumpMinitool executables. It additionally filters for certain folders typically used for legitimate purposes, such as Microsoft Visual Studio Extensions. Moreover, this rule looks for command line arguments that indicate suspicious activity, such as the presence of '.txt' in the command line or certain flags associated with process dumping commands. The conditions are carefully crafted to minimize false positives while effectively capturing malicious behaviors related to DumpMinitool usage.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-04-06