- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Detects attempts to dump the LSASS process memory using the Sysinternals ProcDump utility.
This rule monitors Windows event logs for command line execution patterns associated with using ProcDump to extract credentials from the Local Security Authority Subsystem Service (LSASS) process. It detects attempts to create memory dumps by looking for command lines containing the -ma
parameter in combination with the lsass.exe process. This enables Datadog to also catch cases in which the attacker has renamed the procdump executable. The LSASS process stores sensitive credentials in memory that attackers commonly target for lateral movement and privilege escalation, even when other credential dumping tools are blocked.
{{host}}
to confirm it was targeting the LSASS process and understand any additional parameters used.