This rule is part of a beta feature. To learn more, contact Support.
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect when procdump is used to dump process memory.

Strategy

Procdump is a sysinternals tool originally created to help trouble shoot running applications. Threat actors have used it to dump process memory in an attempt to extract credentials, oftentimes from the lsass process.

Triage and response

  1. Identify what process is being dumped, and if it is authorized or expected.
  2. If it’s not authorized, isolate the host from the network.
  3. Follow your organization’s internal processes for investigating and remediating compromised systems.

Requires Agent version 7.50.0 or greater.

This rule is a part of the beta for detections on Windows! If you would like to try the new Windows agent, create a support ticket and indicate that you wish to join the Cloud Security Management - Windows beta.

PREVIEWING: rtrieu/product-analytics-ui-changes