title: QuarksPwDump Dump File id: 847def9e-924d-4e90-b7c4-5f581395a2b4 status: experimental description: Detects a dump file written by QuarksPwDump password dumper references: - https://jpcertcc.github.io/ToolAnalysisResultSheet/details/QuarksPWDump.htm author: Florian Roth date: 2018/02/10 tags: - attack.credential_access - attack.t1003 level: critical logsource: product: windows service: sysmon detection: selection: # Sysmon: File Creation (ID 11) EventID: 11 TargetFilename: '*\AppData\Local\Temp\SAM-*.dmp*' condition: selection falsepositives: - Unknown