30 lines
847 B
YAML
30 lines
847 B
YAML
title: DumpMinitool Usage
|
|
id: dee0a7a3-f200-4112-a99b-952196d81e42
|
|
status: experimental
|
|
description: Detects the use of "DumpMinitool.exe" a tool bundled with Visual Studio and DotNTET
|
|
references:
|
|
- https://twitter.com/mrd0x/status/1511415432888131586
|
|
- https://twitter.com/mrd0x/status/1511489821247684615
|
|
author: Florian Roth (Nextron Systems)
|
|
date: 2022/04/06
|
|
modified: 2022/11/18
|
|
tags:
|
|
- attack.defense_evasion
|
|
- attack.t1036
|
|
- attack.t1003.001
|
|
logsource:
|
|
category: process_creation
|
|
product: windows
|
|
detection:
|
|
selection_img:
|
|
- Image|endswith: '\DumpMinitool.exe'
|
|
- OriginalFileName: 'DumpMinitool.exe'
|
|
selection_cli:
|
|
CommandLine|contains|all:
|
|
- ' --processId '
|
|
- ' --dumpType Full'
|
|
condition: 1 of selection_*
|
|
falsepositives:
|
|
- Unknown
|
|
level: medium
|