From 55ea53884199c8cb3b37175afa490ca910df8da3 Mon Sep 17 00:00:00 2001 From: Kirill Kiryanov Date: Thu, 8 Oct 2020 14:29:21 +0300 Subject: [PATCH] Created rule win_susp_sqldumper_activity.yml --- .../win_susp_sqldumper_activity.yml | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 rules/windows/process_creation/win_susp_sqldumper_activity.yml diff --git a/rules/windows/process_creation/win_susp_sqldumper_activity.yml b/rules/windows/process_creation/win_susp_sqldumper_activity.yml new file mode 100644 index 000000000..29ddc6b38 --- /dev/null +++ b/rules/windows/process_creation/win_susp_sqldumper_activity.yml @@ -0,0 +1,29 @@ +title: Dumping process via sqldumper.exe +id: 23ceaf5c-b6f1-4a32-8559-f2ff734be516 +description: Detects process dump via legitimate sqldumper.exe binary +status: experimental +references: + - https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OtherMSBinaries/Sqldumper.yml + - https://twitter.com/countuponsec/status/910977826853068800 + - https://twitter.com/countuponsec/status/910969424215232518 + - https://lolbas-project.github.io/lolbas/OtherMSBinaries/Sqldumper/ +author: Kirill Kiryanov, oscd.community +date: 2020/10/08 +tags: + - attack.credential_access + - attack.t1003 + - attack.t1003.001 +logsource: + category: process_creation + product: windows +detection: + selection: + Image|endswith: '\sqldumper.exe' + CommandLine|contains: + - '0x0110' + - '0x01100:40' + condition: selection +falsepositives: + - Legitimate MSSQL Server actions +level: medium +