344. Adversaries Added Another Forensic Tool to Their Arsenal
Hello everyone!
We talked about it a few times already, but I've spotted another forensic tool in adversary's arsenal today.
And yes, it's another example of how threat actors can obtain an LSASS dump. This time, according to this post, they used MemProcFS to mount a dump of compromised system's memory:
memprocfs.exe -device dump.dmp
If you are not doing incident response, for example, MemProcFS execution is a quite suspicious event, so it's worth a query:
event_type: "processcreatewin"
AND
proc_file_originalfilename: "memprocfs.exe"
See you tomorrow!

Comments
Post a Comment