heroui logo

Credential Dumping Tools Service Execution - System

Sigma Rules

View Source
Summary
This detection rule identifies the execution of well-known credential dumping tools through service execution events on Windows systems. It focuses on monitoring service control manager (SCM) events specifically looking for Event ID 7045, which indicates a new service has been installed. The rule checks if the image path of the service installation contains names associated with known credential dumping tools, such as 'cachedump', 'pwdump', and 'gsecdump'. By leveraging this information, the rule can alert security personnel to potentially malicious activities attempting to extract sensitive credential information from the system. False positives may occur if legitimate administrators utilize these tools for password recovery, thus necessitating contextual evaluation of alerts generated by this rule.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Service
  • Logon Session
Created: 2017-03-05