
Summary
This rule is designed to detect suspicious activities involving the use of the Windows diagnostic tool 'rdrleakdiag.exe', which is used for analyzing memory leaks. Threat actors may exploit this tool to create memory dumps, extracting sensitive data such as credentials or encryption keys, particularly from the Local Security Authority Subsystem Service (LSASS). The detection logic identifies memory dump commands executed by rdrleakdiag, even when the binary name has been altered. The rule leverages Windows event logs and process command-line parameters to track instances of memory dump attempts, thereby identifying credential dumping activities. The reference to ongoing security investigations and methodologies reflects the importance of monitoring this technique as part of a broader security posture against credential theft.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
ATT&CK Techniques
- T1003.001
- T1003
Created: 2024-02-09