344. Adversaries Added Another Forensic Tool to Their Arsenal

Hello everyone!

We talked about it a few times already, but I've spotted another forensic tool in adversary's arsenal today.

And yes, it's another example of how threat actors can obtain an LSASS dump. This time, according to this post, they used MemProcFS to mount a dump of compromised system's memory:

memprocfs.exe -device dump.dmp

If you are not doing incident response, for example, MemProcFS execution is a quite suspicious event, so it's worth a query:

event_type: "processcreatewin"

AND

proc_file_originalfilename: "memprocfs.exe"

See you tomorrow!


Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge