heroui logo

Full User-Mode Dumps Enabled System-Wide

Elastic Detection Rules

View Source
Summary
The detection rule identifies when the full user-mode dumps feature is enabled system-wide on Windows machines. This ability is exploited in the LSASS Shtinkering attack, which involves faking an application crash in the LSASS process to generate memory dumps containing sensitive credentials without executing malware. By default, this feature is disabled, and applications must create specific registry keys to enable crash data collection. Supplying alerts when this feature is enabled helps detect abuse scenarios where an attacker may change registry settings to capture sensitive information, paving the way for credential theft. Exclusions in the rule help avoid false positives from legitimate system processes, ensuring that alerts specifically indicate potential malicious activity, allowing for appropriate investigation and response.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • File
  • User Account
  • Process
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1003
  • T1003.001
  • T1112
Created: 2022-08-28