heroui logo

DumpStack.log Defender Evasion

Sigma Rules

View Source
Summary
This detection rule targets the specific evasion tactic where the filename 'DumpStack.log' is used by malicious actors to bypass Microsoft Defender's security checks. The rule monitors for process creation events where the command line either ends with '\DumpStack.log' or specifically includes the '-o DumpStack.log' flag. The goal is to identify when potentially malicious processes are attempting to obscure their actions by borrowing the name of a seemingly benign system log file. This rule is crucial in environments where Microsoft Defender is employed, ensuring that atypical behaviors associated with the use of this log file name are flagged for investigation.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-01-06