Process memory dumped using procdump

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detect when procdump is used to dump process memory.

Strategy

Procdump is a sysinternals tool originally created to help trouble shoot running applications. Threat actors have used it to dump process memory in an attempt to extract credentials, oftentimes from the lsass process.

Triage and response

  1. Identify what process is being dumped, and if it is authorized or expected.
  2. If it’s not authorized, isolate the host from the network.
  3. Follow your organization’s internal processes for investigating and remediating compromised systems.

Requires Agent version 7.50.0 or greater.

This rule is a part of the beta for detections on Windows! If you would like to try the new Windows agent, create a support ticket and indicate that you wish to join the Cloud Security Management - Windows beta.

PREVIEWING: drodriguezhdez/add_public_docs_log_summarization