heroui logo

Renamed ProcDump Execution

Sigma Rules

View Source
Summary
The detection rule identifies the execution of a renamed executable version of ProcDump, a powerful tool often leveraged by attackers and malware for process dumping and gaining access to sensitive information. This renaming tactic is used to circumvent security measures and avoid detection by security solutions. The rule looks for process creation events where the original filename matches 'procdump' and examines the command line arguments for extensive memory dumping flags. It specifically checks for the presence of known command line flags associated with ProcDump while filtering out legitimate executions based on a predefined set of known file names. False positives may arise in situations where ProcDump is bundled with legitimate software or when system administrators rename binaries. With a high detection level, this rule is crucial for identifying potential malicious activity in the Windows environment.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2019-11-18