Detectionhightest
Credential Dumping Tools Service Execution - Security
Detects well-known credential dumping tools execution via service execution events
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Florian Roth (Nextron Systems), Teymur Kheirkhabarov, Daniil Yugoslavskiy, oscd.communityCreated Sun Mar 05Updated Tue Nov 29f0d1feba-4344-4ca9-8121-a6c97bd6df52windows
Log Source
Windowssecurity
ProductWindows← raw: windows
Servicesecurity← raw: security
Definition
The 'System Security Extension' audit subcategory need to be enabled to log the EID 4697
Detection Logic
Detection Logic1 selector
detection:
selection:
EventID: 4697
ServiceFileName|contains:
- 'cachedump'
- 'dumpsvc'
- 'fgexec'
- 'gsecdump'
- 'mimidrv'
- 'pwdump'
- 'servpw'
condition: selectionFalse Positives
Legitimate Administrator using credential dumping tool for password recovery
References
MITRE ATT&CK
Rule Metadata
Rule ID
f0d1feba-4344-4ca9-8121-a6c97bd6df52
Status
test
Level
high
Type
Detection
Created
Sun Mar 05
Modified
Tue Nov 29
Path
rules/windows/builtin/security/win_security_mal_creddumper.yml
Raw Tags
attack.credential-accessattack.executionattack.t1003.001attack.t1003.002attack.t1003.004attack.t1003.005attack.t1003.006attack.t1569.002attack.s0005