heroui logo

Potentially Suspicious DMP/HDMP File Creation

Sigma Rules

View Source
Summary
This rule detects the creation of files with the extensions ".dmp" and ".hdmp" by shell or scripting applications such as cmd.exe, PowerShell, or similar tools. These file types are typically generated during software crashes and might contain sensitive information, including user credentials. The detection logic focuses on identifying processes that are known to create memory dumps and monitoring for the specific file extensions commonly associated with such dumps. Given that memory dumps can reveal critical data, it's important to investigate the source of the crash to determine whether it is a legitimate system event or a potential malicious activity aimed at exfiltrating credentials or sensitive data.
Categories
  • Windows
  • Endpoint
Data Sources
  • File
  • Process
Created: 2023-09-07