LOLBAS/yml/OtherMSBinaries/Sqldumper.yml

37 lines
1.8 KiB
YAML
Raw Normal View History

2018-06-09 00:15:06 +02:00
---
Name: Sqldumper.exe
Description: Debugging utility included with Microsoft SQL.
Author: 'Oddvar Moe'
Created: 2018-05-25
2018-06-09 00:15:06 +02:00
Commands:
- Command: sqldumper.exe 464 0 0x0110
Description: Dump process by PID and create a dump file (Appears to create a dump file called SQLDmprXXXX.mdmp).
2020-06-15 23:33:34 +02:00
Usecase: Dump process using PID.
Category: Dump
Privileges: Administrator
MitreID: T1003
OperatingSystem: Windows
2018-06-09 00:15:06 +02:00
- Command: sqldumper.exe 540 0 0x01100:40
2020-06-15 23:33:34 +02:00
Description: 0x01100:40 flag will create a Mimikatz compatible dump file.
Usecase: Dump LSASS.exe to Mimikatz compatible dump using PID.
Category: Dump
Privileges: Administrator
2021-11-05 21:35:58 +01:00
MitreID: T1003.001
OperatingSystem: Windows
Full_Path:
- Path: C:\Program Files\Microsoft SQL Server\90\Shared\SQLDumper.exe
- Path: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis\AS OLEDB\140\SQLDumper.exe
Code_Sample:
- Code:
Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/683b63f8184b93c9564c4310d10c571cbe367e1e/rules/windows/process_creation/proc_creation_win_lolbin_susp_sqldumper_activity.yml
- Elastic: https://github.com/elastic/detection-rules/blob/f6421d8c534f295518a2c945f530e8afc4c8ad1b/rules/windows/credential_access_lsass_memdump_file_created.toml
- Elastic: https://github.com/elastic/detection-rules/blob/5bdf70e72c6cd4547624c521108189af994af449/rules/windows/credential_access_cmdline_dump_tool.toml
2018-06-09 00:15:06 +02:00
Resources:
- Link: https://twitter.com/countuponsec/status/910969424215232518
- Link: https://twitter.com/countuponsec/status/910977826853068800
- Link: https://support.microsoft.com/en-us/help/917825/how-to-use-the-sqldumper-exe-utility-to-generate-a-dump-file-in-sql-se
Acknowledgement:
- Person: Luis Rocha
Handle: '@countuponsec'