heroui logo

Credential Dumping Tools Service Execution - Security

Sigma Rules

View Source
Summary
This rule detects the execution of well-known credential dumping tools in a Windows environment by monitoring service execution events, specifically focusing on Event ID 4697. Credential dumping is a common tactic employed by adversaries to extract credentials from memory or disk, aiding in lateral movement and further exploitation within a network. The detection relies on identifying specific service filenames associated with popular credential dumping utilities, such as 'cachedump', 'pwdump', and 'mimidrv'. Administrators should enable the 'System Security Extension' audit subcategory to ensure that these events are logged appropriately. While the rule is effective, it may trigger false positives if legitimate administrators use these tools for benign purposes, such as password recovery.
Categories
  • Windows
  • On-Premise
Data Sources
  • Windows Registry
  • Logon Session
  • Service
Created: 2017-03-05