
Summary
This rule detects the execution of the tool 'dotnet-dump' when run with the 'collect' flag, which is commonly used to create memory dumps of processes in Windows environments. The presence of memory dumps could indicate malicious behavior, such as the targeting of crucial processes like LSASS (Local Security Authority Subsystem Service), which stores sensitive information. The rule uses process creation logs and identifies the execution of 'dotnet-dump.exe' or 'dotnet-dump.dll' with the specific command line argument that signifies a collection command. This can be crucial in environments where monitoring of process memory access is necessary to prevent potential data breaches. However, users should be cautious of false positives, since legitimate usage of 'dotnet-dump' may occur in troubleshooting scenarios, necessitating an additional investigation into the process ID and its context.
Categories
- Endpoint
- Windows
- Infrastructure
Data Sources
- Process
- Command
- Application Log
Created: 2023-03-14