heroui logo

DumpMinitool Execution

Sigma Rules

View Source
Summary
The 'DumpMinitool Execution' detection rule is designed to identify instances of the process memory dumping tool, 'DumpMinitool.exe'. This tool can be leveraged by attackers to collect sensitive information from running processes by using the 'MiniDumpWriteDump' function. The rule focuses on detecting the creation of the DumpMinitool executables in various architectures (x86, arm64) both directly through process creation events and also via command line arguments that indicate the specific use of memory dumping ('Full', 'Mini', 'WithHeap'). By monitoring these processes and their associated command line inputs, the detection rule aims to thwart potential defense evasion techniques that utilize memory dumping to extract data without raising alarms. To ensure accuracy, the rule incorporates multiple conditions, requiring that all specified criteria must be met for a detection to be triggered, thus minimizing false positives.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Command
Created: 2022-04-06