Windows potential lsass process dump via procdump

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects attempts to dump the LSASS process memory using the Sysinternals ProcDump utility.

Strategy

This rule monitors Windows event logs for command line execution patterns associated with using ProcDump to extract credentials from the Local Security Authority Subsystem Service (LSASS) process. It detects attempts to create memory dumps by looking for command lines containing the -ma parameter in combination with the lsass.exe process. This enables Datadog to also catch cases in which the attacker has renamed the procdump executable. The LSASS process stores sensitive credentials in memory that attackers commonly target for lateral movement and privilege escalation, even when other credential dumping tools are blocked.

Triage & Response

  • Examine the full command line on {{host}} to confirm it was targeting the LSASS process and understand any additional parameters used.
  • Investigate if the dump file was accessed, copied, or exfiltrated after creation.
  • Review authentication logs before the incident to identify how the attacker gained access to execute ProcDump.
  • Ensure PowerShell and command line logging is enabled across the environment for better visibility.