
Summary
The detection rule for MultiDump.exe execution analyzes the usage of the 'rundll32' process in conjunction with specific command line parameters that are closely associated with MultiDump, a stealthy post-exploitation tool designed to extract sensitive information from system memory. The key command line parameters include 'OpenOptimizationControlPanel', 'cleanup', 'defrag', 'optimize:startup', 'report', and the file extension '.dmp'. This rule aims to identify potentially malicious activity by logging instances of these executions and correlating them with EDR (Endpoint Detection and Response) data. The provided Splunk logic captures endpoint data that matches these criteria, logs the relevant process details, and aggregates this information over 1-second intervals. By utilizing this rule, security teams can enhance their monitoring capabilities against credential dumping attacks via LSASS memory, contributing to proactive threat detection and response strategies against post-exploitation behaviors that target sensitive account information stored within Windows systems.
Categories
- Windows
- Endpoint
Data Sources
- Process
- User Account
- Application Log
- Network Traffic
ATT&CK Techniques
- T1003.002
- T1003
- T1003.001
Created: 2024-02-09