Detectionhightest

Remote Thread Created In KeePass.EXE

Detects remote thread creation in "KeePass.exe" which could indicates potential password dumping activity

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Timon HackenjosCreated Fri Apr 22Updated Fri May 0577564cc2-7382-438b-a7f6-395c2ae53b9awindows
Log Source
WindowsRemote Thread Creation
ProductWindows← raw: windows
CategoryRemote Thread Creation← raw: create_remote_thread
Detection Logic
Detection Logic1 selector
detection:
    selection:
        TargetImage|endswith: '\KeePass.exe'
    condition: selection
False Positives
Unknown

False positive likelihood has not been assessed. Additional context may be needed during triage.

Rule Metadata
Rule ID
77564cc2-7382-438b-a7f6-395c2ae53b9a
Status
test
Level
high
Type
Detection
Created
Fri Apr 22
Modified
Fri May 05
Path
rules/windows/create_remote_thread/create_remote_thread_win_keepass.yml
Raw Tags
attack.credential-accessattack.t1555.005
View on GitHub