heroui logo

Copy .DMP/.DUMP Files From Remote Share Via Cmd.EXE

Sigma Rules

View Source
Summary
This detection rule monitors the use of the Windows command line to find instances where .DMP or .DUMP files are being copied from a remote share using the `copy` command with `cmd.exe`. This behavior could indicate an attempt to exfiltrate sensitive debugging or crash dump information that might contain sensitive data, such as user credentials or application data. The rule triggers looking specifically for command lines that contain `copy` followed by `\` indicating a remote path, and ensure that the file type being copied is one of the targeted extensions. It is designed to provide alerts on potentially malicious credential access activities by capturing the process creation events related to this instruction. The presence of such commands often signifies preparatory steps for more extensive data compromises, making detection crucial in modern cybersecurity frameworks.
Categories
  • Windows
  • Endpoint
  • Network
Data Sources
  • Process
Created: 2022-09-27